x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:44:00 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, 0x0, 0x0) 16:44:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3cf}, 0x28) 16:44:00 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x7a}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:00 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:44:01 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 16:44:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3d0}, 0x28) 16:44:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:01 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, 0x0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:01 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0xf0}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:01 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 16:44:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3d1}, 0x28) 16:44:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:01 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, 0x0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:01 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 16:44:01 executing program 3: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:01 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x300}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, 0x0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3d2}, 0x28) 16:44:01 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:44:01 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:01 executing program 3: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r2, 0x0, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:01 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:01 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x500}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3d3}, 0x28) 16:44:01 executing program 3: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:01 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:44:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3d4}, 0x28) [ 1809.280903] validate_nla: 5 callbacks suppressed [ 1809.280915] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r2, 0x0, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:02 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:02 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:02 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x600}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3d5}, 0x28) 16:44:02 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:44:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r2, 0x0, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:02 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:02 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, 0x0, 0x0) [ 1809.669340] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3d6}, 0x28) 16:44:02 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, 0x0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x14, r2, 0x70f, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 16:44:02 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:02 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, 0x0, 0x0) 16:44:02 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x700}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:02 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, 0x0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3d7}, 0x28) 16:44:02 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, 0x0, 0x0) 16:44:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:02 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) [ 1810.094082] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:02 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, 0x0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3d8}, 0x28) 16:44:02 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 16:44:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:02 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0xec0}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:03 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x0, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:03 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 16:44:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:03 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) [ 1810.458684] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3d9}, 0x28) 16:44:03 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x0, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:03 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 16:44:03 executing program 1: socket$inet6(0xa, 0x2, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:03 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x2000}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3da}, 0x28) 16:44:03 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:03 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x0, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:03 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:44:03 executing program 1: capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) [ 1810.830245] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:03 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x14, r0, 0x70f, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 16:44:03 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:44:03 executing program 1: capset(0x0, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3db}, 0x28) 16:44:03 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x3f00}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:03 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:03 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000000)={0x80000000, 0x9, {0xffffffffffffffff}, {r4}, 0x401, 0x6}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f0000000040)={0x57cb6ee}) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:03 executing program 1: capset(0x0, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:03 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:44:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3dc}, 0x28) [ 1811.243474] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:03 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:03 executing program 1: capset(0x0, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:04 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, 0x0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3dd}, 0x28) 16:44:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000000)={0x80000000, 0x9, {0xffffffffffffffff}, {r4}, 0x401, 0x6}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f0000000040)={0x57cb6ee}) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:04 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x4800}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:04 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:04 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, 0x0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:04 executing program 1: capset(&(0x7f0000000140), &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3de}, 0x28) 16:44:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:04 executing program 1: capset(&(0x7f0000000140), &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000000)={0x80000000, 0x9, {0xffffffffffffffff}, {r4}, 0x401, 0x6}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f0000000040)={0x57cb6ee}) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:04 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, 0x0, 0x70f, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) [ 1811.734714] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:04 executing program 1: capset(&(0x7f0000000140), &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3df}, 0x28) 16:44:04 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x4c00}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:04 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x0, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000000)={0x80000000, 0x9, {0xffffffffffffffff}, {r4}, 0x401, 0x6}) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:04 executing program 1: capset(&(0x7f0000000140)={0x20080522}, 0x0) 16:44:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3e0}, 0x28) 16:44:04 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x0, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) [ 1812.155134] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:04 executing program 1: capset(&(0x7f0000000140)={0x20080522}, 0x0) 16:44:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:04 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x58ba}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3e1}, 0x28) 16:44:05 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r0, 0x0, 0x0, 0x0, {0x6}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) [ 1812.443008] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:05 executing program 1: capset(&(0x7f0000000140)={0x20080522}, 0x0) 16:44:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:05 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x14, r0, 0x70f, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 16:44:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3e2}, 0x28) 16:44:05 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x6000}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:05 executing program 1: capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x11, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000005c0)=ANY=[@ANYRES32=r5, @ANYBLOB="a6000000a1ce7adb13033e5e580b42b8d8f553e30f66eb2e89ae809ce925a8521fae925a654d51fa387958e444f6a22eeebd60d67ba436d1344726b3c4a19b084f7bed2adeb7be14a73ba10d060cd5a6798a8b23c3b8c9392acd4ef1b44b83995a480ef0dd80afdab58e55e3ccea164304114141bc16bb14e730e3a6f15434ec15459422a9e3ebfef8ae51e40ce75a2ce5df5583ab45a390bd54837466dc5d1a110eebf19bb813db78d6"], &(0x7f0000000680)=0xae) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000740)=0x61) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) [ 1812.764112] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3e3}, 0x28) 16:44:05 executing program 1: capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x6, 0x9, 0x800, 0x3}) 16:44:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:05 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x6800}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(0x0, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3e4}, 0x28) 16:44:05 executing program 1: capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9, 0x800, 0x3}) 16:44:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(0x0, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3e5}, 0x28) 16:44:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x11, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000005c0)=ANY=[@ANYRES32=r5, @ANYBLOB="a6000000a1ce7adb13033e5e580b42b8d8f553e30f66eb2e89ae809ce925a8521fae925a654d51fa387958e444f6a22eeebd60d67ba436d1344726b3c4a19b084f7bed2adeb7be14a73ba10d060cd5a6798a8b23c3b8c9392acd4ef1b44b83995a480ef0dd80afdab58e55e3ccea164304114141bc16bb14e730e3a6f15434ec15459422a9e3ebfef8ae51e40ce75a2ce5df5583ab45a390bd54837466dc5d1a110eebf19bb813db78d6"], &(0x7f0000000680)=0xae) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32=r6, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) 16:44:05 executing program 1: capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:05 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x6c00}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(0x0, &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3e6}, 0x28) 16:44:06 executing program 1: capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140), &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3e7}, 0x28) 16:44:06 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x11, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000005c0)=ANY=[@ANYRES32=r5, @ANYBLOB="a6000000a1ce7adb13033e5e580b42b8d8f553e30f66eb2e89ae809ce925a8521fae925a654d51fa387958e444f6a22eeebd60d67ba436d1344726b3c4a19b084f7bed2adeb7be14a73ba10d060cd5a6798a8b23c3b8c9392acd4ef1b44b83995a480ef0dd80afdab58e55e3ccea164304114141bc16bb14e730e3a6f15434ec15459422a9e3ebfef8ae51e40ce75a2ce5df5583ab45a390bd54837466dc5d1a110eebf19bb813db78d6"], &(0x7f0000000680)=0xae) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000740)=0x61) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) 16:44:06 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x7400}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:06 executing program 1: capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140), &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:06 executing program 1: capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9, 0x0, 0x3}) 16:44:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3e8}, 0x28) 16:44:06 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0x7a00}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140), &(0x7f0000000180)={0x8, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:06 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000005c0)=ANY=[@ANYRES32=r4, @ANYBLOB="a6000000a1ce7adb13033e5e580b42b8d8f553e30f66eb2e89ae809ce925a8521fae925a654d51fa387958e444f6a22eeebd60d67ba436d1344726b3c4a19b084f7bed2adeb7be14a73ba10d060cd5a6798a8b23c3b8c9392acd4ef1b44b83995a480ef0dd80afdab58e55e3ccea164304114141bc16bb14e730e3a6f15434ec15459422a9e3ebfef8ae51e40ce75a2ce5df5583ab45a390bd54837466dc5d1a110eebf19bb813db78d6"], &(0x7f0000000680)=0xae) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3e9}, 0x28) 16:44:06 executing program 1: capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9}) 16:44:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, 0x0) 16:44:06 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0xba58}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:06 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ftruncate(r3, 0x400) r4 = accept$netrom(r3, &(0x7f0000000140)={{0x3, @rose}, [@default, @null, @bcast, @rose, @remote, @remote, @remote, @null]}, &(0x7f0000000040)=0x48) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000001c0)=0x8a8, 0x4) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x2000, 0x2, 0x2, 0x2], 0x3, 0xc2, 0x3}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ftruncate(r5, 0x400) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000200)={0x9, 0x40, 0x200}) 16:44:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3ea}, 0x28) 16:44:07 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, 0x0) 16:44:07 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000005c0)=ANY=[@ANYRES32=r4, @ANYBLOB="a6000000a1ce7adb13033e5e580b42b8d8f553e30f66eb2e89ae809ce925a8521fae925a654d51fa387958e444f6a22eeebd60d67ba436d1344726b3c4a19b084f7bed2adeb7be14a73ba10d060cd5a6798a8b23c3b8c9392acd4ef1b44b83995a480ef0dd80afdab58e55e3ccea164304114141bc16bb14e730e3a6f15434ec15459422a9e3ebfef8ae51e40ce75a2ce5df5583ab45a390bd54837466dc5d1a110eebf19bb813db78d6"], &(0x7f0000000680)=0xae) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000740)=0x61) [ 1814.450719] validate_nla: 4 callbacks suppressed [ 1814.450899] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3eb}, 0x28) 16:44:07 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, 0x0) 16:44:07 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ftruncate(r3, 0x400) r4 = accept$netrom(r3, &(0x7f0000000140)={{0x3, @rose}, [@default, @null, @bcast, @rose, @remote, @remote, @remote, @null]}, &(0x7f0000000040)=0x48) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000001c0)=0x8a8, 0x4) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x2000, 0x2, 0x2, 0x2], 0x3, 0xc2, 0x3}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ftruncate(r5, 0x400) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000200)={0x9, 0x40, 0x200}) 16:44:07 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0xc00e}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3ec}, 0x28) 16:44:07 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x3ff, 0x6, 0x9, 0x800, 0x3}) 16:44:07 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000005c0)=ANY=[@ANYRES32=r4, @ANYBLOB="a6000000a1ce7adb13033e5e580b42b8d8f553e30f66eb2e89ae809ce925a8521fae925a654d51fa387958e444f6a22eeebd60d67ba436d1344726b3c4a19b084f7bed2adeb7be14a73ba10d060cd5a6798a8b23c3b8c9392acd4ef1b44b83995a480ef0dd80afdab58e55e3ccea164304114141bc16bb14e730e3a6f15434ec15459422a9e3ebfef8ae51e40ce75a2ce5df5583ab45a390bd54837466dc5d1a110eebf19bb813db78d6"], &(0x7f0000000680)=0xae) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32=r5, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:07 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ftruncate(r3, 0x400) r4 = accept$netrom(r3, &(0x7f0000000140)={{0x3, @rose}, [@default, @null, @bcast, @rose, @remote, @remote, @remote, @null]}, &(0x7f0000000040)=0x48) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000001c0)=0x8a8, 0x4) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x2000, 0x2, 0x2, 0x2], 0x3, 0xc2, 0x3}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ftruncate(r5, 0x400) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000200)={0x9, 0x40, 0x200}) [ 1814.849857] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x6, 0x9, 0x800, 0x3}) 16:44:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3ed}, 0x28) 16:44:07 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:07 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ftruncate(r3, 0x400) r4 = accept$netrom(r3, &(0x7f0000000140)={{0x3, @rose}, [@default, @null, @bcast, @rose, @remote, @remote, @remote, @null]}, &(0x7f0000000040)=0x48) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000001c0)=0x8a8, 0x4) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x2000, 0x2, 0x2, 0x2], 0x3, 0xc2, 0x3}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ftruncate(r5, 0x400) 16:44:07 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0xf000}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9, 0x800, 0x3}) 16:44:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3ee}, 0x28) 16:44:07 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:07 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) [ 1815.262953] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:07 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ftruncate(r3, 0x400) r4 = accept$netrom(r3, &(0x7f0000000140)={{0x3, @rose}, [@default, @null, @bcast, @rose, @remote, @remote, @remote, @null]}, &(0x7f0000000040)=0x48) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000001c0)=0x8a8, 0x4) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x2000, 0x2, 0x2, 0x2], 0x3, 0xc2, 0x3}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) 16:44:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3ef}, 0x28) 16:44:08 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:08 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:08 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7, 0x0, 0xffff}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 16:44:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3f0}, 0x28) 16:44:08 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ftruncate(r3, 0x400) r4 = accept$netrom(r3, &(0x7f0000000140)={{0x3, @rose}, [@default, @null, @bcast, @rose, @remote, @remote, @remote, @null]}, &(0x7f0000000040)=0x48) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000001c0)=0x8a8, 0x4) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x2000, 0x2, 0x2, 0x2], 0x3, 0xc2, 0x3}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) [ 1815.646231] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:08 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3f1}, 0x28) 16:44:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) 16:44:08 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:08 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0x2, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:08 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ftruncate(r3, 0x400) r4 = accept$netrom(r3, &(0x7f0000000140)={{0x3, @rose}, [@default, @null, @bcast, @rose, @remote, @remote, @remote, @null]}, &(0x7f0000000040)=0x48) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000001c0)=0x8a8, 0x4) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x2000, 0x2, 0x2, 0x2], 0x3, 0xc2, 0x3}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 16:44:08 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3f2}, 0x28) 16:44:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) [ 1816.031176] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:08 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:08 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0x3, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:08 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ftruncate(r3, 0x400) r4 = accept$netrom(r3, &(0x7f0000000140)={{0x3, @rose}, [@default, @null, @bcast, @rose, @remote, @remote, @remote, @null]}, &(0x7f0000000040)=0x48) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000001c0)=0x8a8, 0x4) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x2000, 0x2, 0x2, 0x2], 0x3, 0xc2, 0x3}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3f3}, 0x28) 16:44:08 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) [ 1816.386145] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3f4}, 0x28) 16:44:09 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ftruncate(r2, 0x400) r3 = accept$netrom(r2, &(0x7f0000000140)={{0x3, @rose}, [@default, @null, @bcast, @rose, @remote, @remote, @remote, @null]}, &(0x7f0000000040)=0x48) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f00000001c0)=0x8a8, 0x4) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:09 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0x9, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b4a, 0x0) 16:44:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3f5}, 0x28) 16:44:09 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:09 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ftruncate(r2, 0x400) accept$netrom(r2, &(0x7f0000000140)={{0x3, @rose}, [@default, @null, @bcast, @rose, @remote, @remote, @remote, @null]}, &(0x7f0000000040)=0x48) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) [ 1816.792811] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b4a, 0x0) 16:44:09 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ftruncate(r2, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3f6}, 0x28) 16:44:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:09 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b4a, 0x0) 16:44:09 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:09 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 1817.142858] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3f7}, 0x28) 16:44:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:09 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0x2b, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3f8}, 0x28) [ 1817.479689] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:10 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:10 executing program 3: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:10 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0x2d, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3f9}, 0x28) 16:44:10 executing program 3: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) [ 1817.898861] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:10 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ftruncate(r2, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3fa}, 0x28) 16:44:10 executing program 3: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:10 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3fb}, 0x28) 16:44:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ftruncate(r2, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:10 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) [ 1818.259169] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:11 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:11 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ftruncate(r2, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:11 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0x35, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3fc}, 0x28) 16:44:11 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:11 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) [ 1818.571427] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:11 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3fd}, 0x28) 16:44:11 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:11 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:11 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0x3e0, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x3fe}, 0x28) 16:44:11 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:11 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) [ 1818.918177] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:11 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x402}, 0x28) 16:44:11 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:11 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:11 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ftruncate(r2, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:11 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x403}, 0x28) 16:44:11 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:12 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ftruncate(r2, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:12 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:12 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0xa, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:12 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:12 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x404}, 0x28) 16:44:12 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:12 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:12 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x405}, 0x28) 16:44:12 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket$inet(0x2, 0x4000000805, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:12 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0xc, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:12 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:12 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:12 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x406}, 0x28) 16:44:12 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:12 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:12 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x15, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:12 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:12 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:12 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x407}, 0x28) 16:44:12 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8)={r0}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:13 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:13 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:13 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x28, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x408}, 0x28) 16:44:13 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8)={r0}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:13 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:13 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8)={r0}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x409}, 0x28) 16:44:13 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2b, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:13 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x40a}, 0x28) 16:44:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:13 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:13 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2d, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x40b}, 0x28) 16:44:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:13 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x40c}, 0x28) 16:44:14 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x30, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:14 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:14 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x40d}, 0x28) 16:44:14 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:14 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x35, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:14 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x40e}, 0x28) 16:44:14 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:14 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140), &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:14 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:14 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x40f}, 0x28) [ 1822.061118] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:14 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140), &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000a8a000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:14 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x3}]}]}, 0x20}}, 0x0) 16:44:14 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x410}, 0x28) 16:44:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140), &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:15 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) [ 1822.392331] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, 0x0) 16:44:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x411}, 0x28) 16:44:15 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x6}]}]}, 0x20}}, 0x0) 16:44:15 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f000034f000)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, 0x0) 16:44:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x412}, 0x28) [ 1822.758051] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:15 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b4a, 0x0) 16:44:15 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x7}]}]}, 0x20}}, 0x0) 16:44:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, 0x0) 16:44:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x413}, 0x28) 16:44:15 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:15 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b4a, 0x0) 16:44:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 1823.012939] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 16:44:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x414}, 0x28) 16:44:15 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8}]}]}, 0x20}}, 0x0) 16:44:15 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:15 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b4a, 0x0) 16:44:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) 16:44:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:16 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x415}, 0x28) 16:44:16 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x9}]}]}, 0x20}}, 0x0) 16:44:16 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:16 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ftruncate(r2, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, &(0x7f0000000740)) 16:44:16 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 1823.584886] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x416}, 0x28) 16:44:16 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ftruncate(r2, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) 16:44:16 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x15}]}]}, 0x20}}, 0x0) 16:44:16 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:16 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x417}, 0x28) 16:44:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) [ 1823.930239] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:16 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ftruncate(r2, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:16 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(0xffffffffffffffff, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) 16:44:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x418}, 0x28) 16:44:16 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x11, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:16 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x28}]}]}, 0x20}}, 0x0) 16:44:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800, 0x3}) 16:44:16 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(0xffffffffffffffff, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:16 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x419}, 0x28) [ 1824.346599] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:17 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:17 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(0xffffffffffffffff, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:17 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:17 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x2b}]}]}, 0x20}}, 0x0) 16:44:17 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:17 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x41a}, 0x28) 16:44:17 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) [ 1824.652745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:17 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:17 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:17 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x41b}, 0x28) 16:44:17 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:17 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x2d}]}]}, 0x20}}, 0x0) 16:44:17 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:17 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x41c}, 0x28) 16:44:17 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) dup2(r1, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:17 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) [ 1825.111274] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:17 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:17 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:17 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x30}]}]}, 0x20}}, 0x0) 16:44:17 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCXONC(r3, 0x540a, 0x0) semctl$GETPID(r1, 0x3, 0xb, &(0x7f0000000000)=""/53) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) r4 = socket$inet6(0xa, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000000)={0x8, "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"}) 16:44:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x41d}, 0x28) 16:44:18 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:18 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 1825.383717] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 16:44:18 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x41e}, 0x28) 16:44:18 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:18 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCXONC(r3, 0x540a, 0x0) semctl$GETPID(r1, 0x3, 0xb, &(0x7f0000000000)=""/53) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) r4 = socket$inet6(0xa, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000000)={0x8, "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"}) 16:44:18 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x35}]}]}, 0x20}}, 0x0) 16:44:18 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x41f}, 0x28) 16:44:18 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:18 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:18 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x7}]}]}, 0x20}}, 0x0) 16:44:18 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCXONC(r3, 0x540a, 0x0) semctl$GETPID(r1, 0x3, 0xb, &(0x7f0000000000)=""/53) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) r4 = socket$inet6(0xa, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000000)={0x8, "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"}) 16:44:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x420}, 0x28) 16:44:18 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, 0x0, &(0x7f0000000080)) 16:44:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:18 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, 0x0, 0x0) 16:44:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x421}, 0x28) 16:44:18 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:18 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0xa}]}]}, 0x20}}, 0x0) 16:44:18 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCXONC(r3, 0x540a, 0x0) semctl$GETPID(r1, 0x3, 0xb, &(0x7f0000000000)=""/53) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) r4 = socket$inet6(0xa, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 16:44:18 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, 0x0, 0x0) 16:44:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x422}, 0x28) 16:44:19 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:19 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, 0x0, 0x0) 16:44:19 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0xc}]}]}, 0x20}}, 0x0) 16:44:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x423}, 0x28) 16:44:19 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCXONC(r3, 0x540a, 0x0) semctl$GETPID(r1, 0x3, 0xb, &(0x7f0000000000)=""/53) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) r4 = socket$inet6(0xa, 0x3, 0x0) dup(r4) 16:44:19 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x424}, 0x28) 16:44:19 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:19 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket$inet(0x2, 0x4000000805, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:19 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x15}]}]}, 0x20}}, 0x0) 16:44:19 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCXONC(r3, 0x540a, 0x0) semctl$GETPID(r1, 0x3, 0xb, &(0x7f0000000000)=""/53) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) socket$inet6(0xa, 0x3, 0x0) 16:44:19 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x425}, 0x28) 16:44:19 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:19 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x426}, 0x28) 16:44:19 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:19 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCXONC(r3, 0x540a, 0x0) semctl$GETPID(r1, 0x3, 0xb, &(0x7f0000000000)=""/53) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:19 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:19 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:44:20 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x28}]}]}, 0x20}}, 0x0) 16:44:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x427}, 0x28) 16:44:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCXONC(r3, 0x540a, 0x0) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:20 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, 0x0, &(0x7f0000000080)) 16:44:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x428}, 0x28) 16:44:20 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = shmget(0x1, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_SET(r1, 0x1, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) fremovexattr(r2, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000000)=""/3) 16:44:20 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x429}, 0x28) 16:44:20 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = shmget(0x1, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_SET(r1, 0x1, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) fremovexattr(r2, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000000)=""/3) 16:44:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, 0x0, &(0x7f0000000080)) 16:44:20 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2b}]}]}, 0x20}}, 0x0) 16:44:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:20 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = shmget(0x1, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_SET(r1, 0x1, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) fremovexattr(r2, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000000)=""/3) 16:44:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x42a}, 0x28) 16:44:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, 0x0, &(0x7f0000000080)) 16:44:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), 0x0) 16:44:20 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = shmget(0x1, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_SET(r1, 0x1, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) fremovexattr(r2, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x42b}, 0x28) 16:44:20 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2d}]}]}, 0x20}}, 0x0) 16:44:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:20 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = shmget(0x1, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_SET(r1, 0x1, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)) fremovexattr(r2, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), 0x0) 16:44:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x42c}, 0x28) 16:44:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = shmget(0x1, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_SET(r1, 0x1, 0x0) r2 = userfaultfd(0x0) fremovexattr(r2, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="59000000fe0009e280e68dc47effc88c4b41649618c3a8aacb99cfadbb3742d0c80fa9b71b98add72cc102001a8d0f5f0da050beec30998881778031303022fdfa941e018e9e6f1a734da22cea9885b1d832810bf7f9bf178d081b662bf5bff8fd311c4c4aa6ada4133ae7eefafb1a1d81e1ac943ff133e4efac16a40d8f51cfa694d2d9dcb6327d248d37df47094cd3d23bda37d1faaeb0a2fdbd562cea9a37bd6b81ac25060df9b47fbeedd60d82eafa6dff1da3886a3851ecb65d8e79417de6622860bca5e65416d4d49c5d7f517762b9d84e440e3c3f6b3102fba5657e067d51416ff45591979ceb937e036f232dbaf8aac4e6bacd00000000be4604424e4200546a1ac880933d820e853c9f374bdc9c457cb39686d58d72b9b08d8dafc9705f3f0d13f44b97880711bfb25303c1"], &(0x7f0000000740)=0x61) 16:44:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), 0x0) 16:44:21 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x30}]}]}, 0x20}}, 0x0) 16:44:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x42d}, 0x28) 16:44:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = shmget(0x1, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_SET(r1, 0x1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:21 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r1, r2}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'crct10dif-generic\x00'}}) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r3, r4}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'crct10dif-generic\x00'}}) r5 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xba, 0xfffffffffffffffe) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvme-fabrics\x00', 0x400440, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r11 = syz_open_dev$vcsu(&(0x7f0000000400)='/dev/vcsu#\x00', 0x6, 0x509000) sendto$inet(r11, &(0x7f0000000540)="0babc6327f2aa6b3fe3d548ec310d1616921c49038b3a300aa79df6401307b2c25bb59043984abe47655817493a3fc7855ca29d47dfcbf8e1d748003f7", 0x3d, 0x0, &(0x7f00006f7000)={0x2, 0x1, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x11, &(0x7f000059aff8)={r12}, &(0x7f000034f000)=0x2059b000) r13 = socket$inet(0x2, 0x4000000805, 0x0) r14 = socket$inet_sctp(0x2, 0x5, 0x84) r15 = dup3(r13, r14, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r14, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r15, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r14, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r14, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r15, 0x84, 0x11, &(0x7f000059aff8)={r16}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f0000000600)={r12, 0x4, 0x2, 0x1, 0x8000, 0xb3ec, 0x7ff, 0x1, {r16, @in={{0x2, 0x4e20, @multicast1}}, 0xfff, 0xc, 0x1f, 0x1ff, 0x6}}, &(0x7f0000000300)=0xb0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r6, r5, r6}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'crct10dif-generic\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r3, r5}, &(0x7f0000000040)=""/96, 0x60, &(0x7f0000000180)={&(0x7f00000000c0)={'sha256-arm64\x00'}, &(0x7f0000000100)="a1e3771c43e0d9a76e072eec9b46690084db877a8c403f4f39b994a42a0c952bcb3693e5c3088642073f1589e5dfbb36ac2dca64276bfaf17dccb800d651b7522bebb0f26d0a7a895583cca116e7dbfbbc7a8e774925dc27a84f154a278e0bf51dd1f5b02a9a227e06b9fcbed6a2554135b633981115dd90", 0x78}) r17 = socket$inet6(0xa, 0x2, 0x0) r18 = dup(r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) ioctl$TCGETS2(r18, 0x802c542a, &(0x7f0000000280)) 16:44:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x42e}, 0x28) 16:44:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = shmget(0x1, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_SET(r1, 0x1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:21 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x35}]}]}, 0x20}}, 0x0) 16:44:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = shmget(0x1, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_SET(r1, 0x1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x42f}, 0x28) 16:44:21 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r1, r2}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'crct10dif-generic\x00'}}) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r3, r4}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'crct10dif-generic\x00'}}) r5 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xba, 0xfffffffffffffffe) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvme-fabrics\x00', 0x400440, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r11 = syz_open_dev$vcsu(&(0x7f0000000400)='/dev/vcsu#\x00', 0x6, 0x509000) sendto$inet(r11, &(0x7f0000000540)="0babc6327f2aa6b3fe3d548ec310d1616921c49038b3a300aa79df6401307b2c25bb59043984abe47655817493a3fc7855ca29d47dfcbf8e1d748003f7", 0x3d, 0x0, &(0x7f00006f7000)={0x2, 0x1, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x11, &(0x7f000059aff8)={r12}, &(0x7f000034f000)=0x2059b000) r13 = socket$inet(0x2, 0x4000000805, 0x0) r14 = socket$inet_sctp(0x2, 0x5, 0x84) r15 = dup3(r13, r14, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r14, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r15, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r14, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r14, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r15, 0x84, 0x11, &(0x7f000059aff8)={r16}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f0000000600)={r12, 0x4, 0x2, 0x1, 0x8000, 0xb3ec, 0x7ff, 0x1, {r16, @in={{0x2, 0x4e20, @multicast1}}, 0xfff, 0xc, 0x1f, 0x1ff, 0x6}}, &(0x7f0000000300)=0xb0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r6, r5, r6}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'crct10dif-generic\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r3, r5}, &(0x7f0000000040)=""/96, 0x60, &(0x7f0000000180)={&(0x7f00000000c0)={'sha256-arm64\x00'}, &(0x7f0000000100)="a1e3771c43e0d9a76e072eec9b46690084db877a8c403f4f39b994a42a0c952bcb3693e5c3088642073f1589e5dfbb36ac2dca64276bfaf17dccb800d651b7522bebb0f26d0a7a895583cca116e7dbfbbc7a8e774925dc27a84f154a278e0bf51dd1f5b02a9a227e06b9fcbed6a2554135b633981115dd90", 0x78}) r17 = socket$inet6(0xa, 0x2, 0x0) r18 = dup(r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) ioctl$TCGETS2(r18, 0x802c542a, &(0x7f0000000280)) 16:44:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) shmget(0x1, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) r1 = userfaultfd(0x0) fremovexattr(r1, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:21 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 16:44:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x430}, 0x28) 16:44:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000a8a000)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) [ 1829.305653] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = userfaultfd(0x0) fremovexattr(r1, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x431}, 0x28) 16:44:22 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x2}]}]}, 0x20}}, 0x0) 16:44:22 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) socket$kcm(0x29, 0x2, 0x0) r0 = userfaultfd(0x0) fremovexattr(r0, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:22 executing program 0: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000012c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, r2) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) recvfrom$inet(0xffffffffffffffff, &(0x7f0000001300)=""/4096, 0x1000, 0x100, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000180)="9ef5932e3e478e5063cd1b1b1796b5d2dfc2e810e847b2fbc9d0d4b869c50f30dbb1a58b72a37966275d1d1d6ebbe983afb9cf4426e98b41a6487aa2d5c41cbf78f7d9be1b80cad73cb45321add019d4a314df27eae11a52a70517d6bef0c9f746b3d520c01329a3fc36d96d19dc2250cd8a865d0b0cbe3f388abd503fba9faaea3827a39703a9a3efc7f7b9173e7e0a1dc31bc0fd70a84bebc16dd38f1a835efe48a88e178d8138ed69a0047f4f4f95a941102830bda0f3868c6ea97e45ff539e6770932065a8a49676c3b00abc8220bf23c113b700d8b1b1e739b06c966eb641115fbf405eb5472fef6ec6d405") r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r5 = userfaultfd(0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x11, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000003c0)={r9, 0x3}, 0x8) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}, 0x0, 0x6000000}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xf, 0x100010, r3, 0xfffff000) ftruncate(r4, 0x400) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000300)=0x1e) ioctl$KDGKBSENT(r3, 0x4b4a, 0x0) 16:44:22 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000540)=""/107) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) [ 1829.659767] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x432}, 0x28) 16:44:22 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = userfaultfd(0x0) fremovexattr(r0, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:22 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = semget(0x2, 0x4, 0x60d) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:22 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x3}]}]}, 0x20}}, 0x0) 16:44:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x433}, 0x28) 16:44:22 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000740)=0x61) 16:44:22 executing program 1: r0 = userfaultfd(0x0) fremovexattr(r0, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:22 executing program 0: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000012c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, r2) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) recvfrom$inet(0xffffffffffffffff, &(0x7f0000001300)=""/4096, 0x1000, 0x100, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000180)="9ef5932e3e478e5063cd1b1b1796b5d2dfc2e810e847b2fbc9d0d4b869c50f30dbb1a58b72a37966275d1d1d6ebbe983afb9cf4426e98b41a6487aa2d5c41cbf78f7d9be1b80cad73cb45321add019d4a314df27eae11a52a70517d6bef0c9f746b3d520c01329a3fc36d96d19dc2250cd8a865d0b0cbe3f388abd503fba9faaea3827a39703a9a3efc7f7b9173e7e0a1dc31bc0fd70a84bebc16dd38f1a835efe48a88e178d8138ed69a0047f4f4f95a941102830bda0f3868c6ea97e45ff539e6770932065a8a49676c3b00abc8220bf23c113b700d8b1b1e739b06c966eb641115fbf405eb5472fef6ec6d405") r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r5 = userfaultfd(0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x11, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000003c0)={r9, 0x3}, 0x8) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}, 0x0, 0x6000000}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xf, 0x100010, r3, 0xfffff000) ftruncate(r4, 0x400) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000300)=0x1e) ioctl$KDGKBSENT(r3, 0x4b4a, 0x0) 16:44:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) [ 1830.074401] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, &(0x7f0000000740)) 16:44:22 executing program 1: userfaultfd(0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x434}, 0x28) 16:44:22 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:22 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x4}]}]}, 0x20}}, 0x0) 16:44:23 executing program 1: userfaultfd(0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:23 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) 16:44:23 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x40, 0x1, 0x8000}) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) [ 1830.436458] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x435}, 0x28) 16:44:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:23 executing program 1: userfaultfd(0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 16:44:23 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) 16:44:23 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x5}]}]}, 0x20}}, 0x0) 16:44:23 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x436}, 0x28) 16:44:23 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x40, 0x1, 0x8000}) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:23 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) 16:44:23 executing program 1: r0 = userfaultfd(0x0) fremovexattr(r0, 0x0) [ 1830.772705] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x437}, 0x28) 16:44:23 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x40, 0x1, 0x8000}) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:23 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:23 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x6}]}]}, 0x20}}, 0x0) 16:44:23 executing program 1: r0 = userfaultfd(0x0) fremovexattr(r0, 0x0) 16:44:23 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x40, 0x1, 0x8000}) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x438}, 0x28) [ 1831.161640] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:23 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000540)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r5 = open(&(0x7f0000000100)='./file0\x00', 0x280800, 0x80) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000140), 0x4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000040)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) 16:44:23 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x40, 0x1, 0x8000}) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:23 executing program 1: r0 = userfaultfd(0x0) fremovexattr(r0, 0x0) 16:44:23 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:23 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x7}]}]}, 0x20}}, 0x0) 16:44:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x439}, 0x28) 16:44:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x2c, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_RSVP_PINFO={0x20, 0x4, {{}, {}, 0x0, 0x0, 0x2}}]}}]}, 0x5c}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@local, @in=@multicast1, 0x4e24, 0x2, 0x4e20, 0xf2f, 0x2, 0x80, 0xa0, 0x2a, r5, 0xffffffffffffffff}, {0x2800000, 0x4, 0x9, 0x62, 0x0, 0x7fffffff, 0x1f, 0x2}, {0x200, 0x100, 0x0, 0x7}, 0x1, 0x6e6bbb, 0x1, 0x0, 0x1}, {{@in=@broadcast, 0x4d5, 0x2b}, 0x15, @in6=@loopback, 0x3500, 0x0, 0x0, 0xff, 0x401, 0xffffffff, 0x5}}, 0xe8) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r6, 0x4b4e, 0x0) [ 1831.496110] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:24 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000000)) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) 16:44:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x43a}, 0x28) 16:44:24 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:24 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x48}]}]}, 0x20}}, 0x0) 16:44:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) 16:44:24 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:24 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x43b}, 0x28) 16:44:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x2c, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_RSVP_PINFO={0x20, 0x4, {{}, {}, 0x0, 0x0, 0x2}}]}}]}, 0x5c}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@local, @in=@multicast1, 0x4e24, 0x2, 0x4e20, 0xf2f, 0x2, 0x80, 0xa0, 0x2a, r5, 0xffffffffffffffff}, {0x2800000, 0x4, 0x9, 0x62, 0x0, 0x7fffffff, 0x1f, 0x2}, {0x200, 0x100, 0x0, 0x7}, 0x1, 0x6e6bbb, 0x1, 0x0, 0x1}, {{@in=@broadcast, 0x4d5, 0x2b}, 0x15, @in6=@loopback, 0x3500, 0x0, 0x0, 0xff, 0x401, 0xffffffff, 0x5}}, 0xe8) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r6, 0x4b4e, 0x0) [ 1831.892786] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) 16:44:24 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:24 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:24 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x4c}]}]}, 0x20}}, 0x0) 16:44:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x43c}, 0x28) 16:44:24 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) 16:44:24 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) [ 1832.180854] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:24 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x5608, 0x0) 16:44:24 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x60}]}]}, 0x20}}, 0x0) 16:44:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x43d}, 0x28) 16:44:25 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:25 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x1) 16:44:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) [ 1832.528993] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x43e}, 0x28) 16:44:25 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x5608, 0x0) 16:44:25 executing program 1: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 16:44:25 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:25 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x68}]}]}, 0x20}}, 0x0) 16:44:25 executing program 1: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 16:44:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:25 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x5608, 0x0) 16:44:25 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x43f}, 0x28) 16:44:25 executing program 1: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 16:44:25 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x6c}]}]}, 0x20}}, 0x0) 16:44:25 executing program 3: ioctl$KDGKBSENT(0xffffffffffffffff, 0x5608, 0x0) 16:44:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:25 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x440}, 0x28) 16:44:25 executing program 3: ioctl$KDGKBSENT(0xffffffffffffffff, 0x5608, 0x0) 16:44:25 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 16:44:25 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:25 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x74}]}]}, 0x20}}, 0x0) 16:44:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/42) 16:44:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x441}, 0x28) 16:44:26 executing program 3: ioctl$KDGKBSENT(0xffffffffffffffff, 0x5608, 0x0) 16:44:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000240)=""/42) 16:44:26 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:26 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x5608, 0x0) 16:44:26 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 16:44:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x442}, 0x28) 16:44:26 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x7a}]}]}, 0x20}}, 0x0) 16:44:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) 16:44:26 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x5608, 0x0) 16:44:26 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 16:44:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x443}, 0x28) 16:44:26 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) 16:44:26 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xf0}]}]}, 0x20}}, 0x0) 16:44:26 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x5608, 0x0) 16:44:26 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) 16:44:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) 16:44:26 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x444}, 0x28) 16:44:26 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x300}]}]}, 0x20}}, 0x0) 16:44:26 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) ftruncate(r4, 0x400) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000380)={0xde, 0x7, 0x3f}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000002c0)=0x7, &(0x7f0000000300)=0x2) 16:44:26 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) 16:44:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) 16:44:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x445}, 0x28) 16:44:27 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) [ 1834.443185] validate_nla: 5 callbacks suppressed [ 1834.443195] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:27 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) 16:44:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x446}, 0x28) 16:44:27 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) 16:44:27 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) ftruncate(r4, 0x400) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000380)={0xde, 0x7, 0x3f}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000002c0)=0x7, &(0x7f0000000300)=0x2) 16:44:27 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x500}]}]}, 0x20}}, 0x0) 16:44:27 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) ftruncate(r4, 0x400) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000380)={0xde, 0x7, 0x3f}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000002c0)=0x7, &(0x7f0000000300)=0x2) 16:44:27 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) [ 1834.745309] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:27 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x447}, 0x28) 16:44:27 executing program 5: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 16:44:27 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x600}]}]}, 0x20}}, 0x0) 16:44:27 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) ftruncate(r4, 0x400) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000380)={0xde, 0x7, 0x3f}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000002c0)=0x7, &(0x7f0000000300)=0x2) 16:44:27 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:27 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) ftruncate(r4, 0x400) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000380)={0xde, 0x7, 0x3f}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000002c0)=0x7, &(0x7f0000000300)=0x2) [ 1835.042740] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x448}, 0x28) 16:44:27 executing program 5: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 16:44:27 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) ftruncate(r4, 0x400) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000380)={0xde, 0x7, 0x3f}) 16:44:27 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:27 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x700}]}]}, 0x20}}, 0x0) 16:44:27 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) ftruncate(r4, 0x400) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000380)={0xde, 0x7, 0x3f}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000002c0)=0x7, &(0x7f0000000300)=0x2) 16:44:27 executing program 5: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 16:44:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x449}, 0x28) 16:44:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:28 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) ftruncate(r4, 0x400) [ 1835.408358] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:28 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 16:44:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x44a}, 0x28) 16:44:28 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) ftruncate(r4, 0x400) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000380)={0xde, 0x7, 0x3f}) 16:44:28 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xec0}]}]}, 0x20}}, 0x0) 16:44:28 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) 16:44:28 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 16:44:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) [ 1835.734859] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:28 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) ftruncate(r4, 0x400) 16:44:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x44b}, 0x28) 16:44:28 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) 16:44:28 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 16:44:28 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x2000}]}]}, 0x20}}, 0x0) 16:44:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:28 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000500)=""/86, &(0x7f0000000280)=0x56) 16:44:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x44c}, 0x28) 16:44:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) prctl$PR_SVE_GET_VL(0x33, 0x1345d) [ 1836.041091] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:28 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) 16:44:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:28 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) 16:44:28 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x3f00}]}]}, 0x20}}, 0x0) 16:44:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x44d}, 0x28) 16:44:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) prctl$PR_SVE_GET_VL(0x33, 0x1345d) 16:44:28 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 16:44:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) [ 1836.409607] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x44e}, 0x28) 16:44:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) prctl$PR_SVE_GET_VL(0x33, 0x1345d) 16:44:29 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) 16:44:29 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) 16:44:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lgetxattr(0x0, &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/154, 0x9a) 16:44:29 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x4800}]}]}, 0x20}}, 0x0) 16:44:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x44f}, 0x28) 16:44:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 16:44:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lgetxattr(0x0, 0x0, &(0x7f00000000c0)=""/154, 0x9a) 16:44:29 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) 16:44:29 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) [ 1836.737385] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 16:44:29 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) 16:44:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x450}, 0x28) 16:44:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lgetxattr(0x0, 0x0, 0x0, 0x0) 16:44:29 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x4c00}]}]}, 0x20}}, 0x0) 16:44:29 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) 16:44:29 executing program 5: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:29 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) [ 1837.098478] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:29 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 16:44:29 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) 16:44:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x451}, 0x28) 16:44:29 executing program 5: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:29 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) 16:44:29 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x58ba}]}]}, 0x20}}, 0x0) 16:44:30 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 16:44:30 executing program 5: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:30 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) 16:44:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x452}, 0x28) 16:44:30 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) r1 = socket$key(0xf, 0x3, 0x2) r2 = getpid() tkill(r2, 0x9) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000240)=r2) [ 1837.507746] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:30 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 16:44:30 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:30 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) 16:44:30 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 16:44:30 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) r1 = getpid() tkill(r1, 0x9) 16:44:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x453}, 0x28) 16:44:30 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x6000}]}]}, 0x20}}, 0x0) 16:44:30 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:30 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) getpid() 16:44:30 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) 16:44:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x454}, 0x28) 16:44:30 executing program 0: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:30 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:30 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) 16:44:30 executing program 0: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x455}, 0x28) 16:44:30 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) r1 = socket$key(0xf, 0x3, 0x2) r2 = getpid() tkill(r2, 0x9) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000240)=r2) 16:44:30 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x6800}]}]}, 0x20}}, 0x0) 16:44:30 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 16:44:30 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) 16:44:31 executing program 0: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x456}, 0x28) 16:44:31 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) r1 = getpid() tkill(r1, 0x9) 16:44:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 16:44:31 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:31 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x6c00}]}]}, 0x20}}, 0x0) 16:44:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x457}, 0x28) 16:44:31 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:31 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) getpid() 16:44:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 16:44:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x458}, 0x28) 16:44:31 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:31 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:31 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) 16:44:31 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x7400}]}]}, 0x20}}, 0x0) 16:44:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) 16:44:31 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x459}, 0x28) 16:44:31 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 16:44:31 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) 16:44:31 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:31 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x7a00}]}]}, 0x20}}, 0x0) 16:44:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x45a}, 0x28) 16:44:31 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 16:44:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) 16:44:31 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:32 executing program 3: ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:32 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 16:44:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x45b}, 0x28) 16:44:32 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xba58}]}]}, 0x20}}, 0x0) 16:44:32 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) 16:44:32 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) 16:44:32 executing program 3: ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:32 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 16:44:32 executing program 3: ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x45c}, 0x28) 16:44:32 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) [ 1839.667344] validate_nla: 5 callbacks suppressed [ 1839.667354] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:32 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) 16:44:32 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) 16:44:32 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:32 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xc00e}]}]}, 0x20}}, 0x0) 16:44:32 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) 16:44:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x45d}, 0x28) [ 1840.003935] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:32 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:32 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) r1 = socket$key(0xf, 0x3, 0x2) r2 = getpid() tkill(r2, 0x9) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000240)=r2) 16:44:32 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) 16:44:32 executing program 1: ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) 16:44:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x45e}, 0x28) 16:44:32 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xf000}]}]}, 0x20}}, 0x0) 16:44:32 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) r1 = getpid() tkill(r1, 0x9) 16:44:32 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:32 executing program 1: ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) [ 1840.295698] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x45f}, 0x28) 16:44:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) 16:44:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x460}, 0x28) 16:44:33 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) getpid() 16:44:33 executing program 1: ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) 16:44:33 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x34000}]}]}, 0x20}}, 0x0) 16:44:33 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, 0x0) 16:44:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x461}, 0x28) 16:44:33 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) 16:44:33 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) 16:44:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) [ 1840.732231] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:33 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, 0x0) 16:44:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x462}, 0x28) 16:44:33 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x400300}]}]}, 0x20}}, 0x0) 16:44:33 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) 16:44:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000004c0)) 16:44:33 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) 16:44:33 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, 0x0) 16:44:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x463}, 0x28) 16:44:33 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) [ 1841.083054] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8200, 0x0) 16:44:33 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:33 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x0, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) 16:44:33 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xf0ffff}]}]}, 0x20}}, 0x0) 16:44:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x464}, 0x28) 16:44:33 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 16:44:34 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x0, "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"}) 16:44:34 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) 16:44:34 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) [ 1841.413489] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:34 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 16:44:34 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x0, "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"}) 16:44:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x465}, 0x28) 16:44:34 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x1000000}]}]}, 0x20}}, 0x0) 16:44:34 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) 16:44:34 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) 16:44:34 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 16:44:34 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) write$P9_RMKNOD(r6, &(0x7f0000000140)={0x14, 0x13, 0x2, {0x40, 0x1, 0x6}}, 0x14) 16:44:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x466}, 0x28) [ 1841.768030] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:34 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) 16:44:34 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x135) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() tkill(r3, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000240)=r3) openat$cgroup_ro(r1, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) 16:44:34 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) write$P9_RMKNOD(r6, &(0x7f0000000140)={0x14, 0x13, 0x2, {0x40, 0x1, 0x6}}, 0x14) 16:44:34 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x2000000}]}]}, 0x20}}, 0x0) 16:44:34 executing program 5: ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) 16:44:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x467}, 0x28) 16:44:34 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) write$P9_RMKNOD(r6, &(0x7f0000000140)={0x14, 0x13, 0x2, {0x40, 0x1, 0x6}}, 0x14) [ 1842.106074] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:34 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) write$P9_RMKNOD(r6, &(0x7f0000000140)={0x14, 0x13, 0x2, {0x40, 0x1, 0x6}}, 0x14) 16:44:34 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) r1 = socket$key(0xf, 0x3, 0x2) r2 = getpid() tkill(r2, 0x9) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000240)=r2) 16:44:34 executing program 5: ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) 16:44:34 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) write$P9_RMKNOD(r6, &(0x7f0000000140)={0x14, 0x13, 0x2, {0x40, 0x1, 0x6}}, 0x14) 16:44:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x468}, 0x28) 16:44:34 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x3000000}]}]}, 0x20}}, 0x0) 16:44:35 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) write$P9_RMKNOD(r6, &(0x7f0000000140)={0x14, 0x13, 0x2, {0x40, 0x1, 0x6}}, 0x14) 16:44:35 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) r1 = getpid() tkill(r1, 0x9) 16:44:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x469}, 0x28) 16:44:35 executing program 5: ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) [ 1842.436280] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:35 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) 16:44:35 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) 16:44:35 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x4000000}]}]}, 0x20}}, 0x0) 16:44:35 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) getpid() 16:44:35 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) 16:44:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x46a}, 0x28) 16:44:35 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) 16:44:35 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) 16:44:35 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) 16:44:35 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) socket$key(0xf, 0x3, 0x2) 16:44:35 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) [ 1842.918095] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:35 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 16:44:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x46b}, 0x28) 16:44:35 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) creat(&(0x7f0000000440)='./file0\x00', 0x135) 16:44:35 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x5000000}]}]}, 0x20}}, 0x0) 16:44:35 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) 16:44:35 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) 16:44:35 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x3ff, 0x200b, 0x2, 0x2, 0x8, 0x2}}) 16:44:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x46c}, 0x28) 16:44:35 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000340)={0x3b2, 0x0, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) 16:44:35 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 16:44:35 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 16:44:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:36 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 16:44:36 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 16:44:36 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x6000000}]}]}, 0x20}}, 0x0) 16:44:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x46d}, 0x28) 16:44:36 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) 16:44:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) 16:44:36 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 16:44:36 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) 16:44:36 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) socket$inet6(0xa, 0x2, 0x0) 16:44:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x46e}, 0x28) 16:44:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:36 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x7000000}]}]}, 0x20}}, 0x0) 16:44:36 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$loop(0x0, 0x0, 0x100082) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r1, @ANYRES16=r2, @ANYRESHEX=r3, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r4], 0x106) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r3, r6, r7) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) 16:44:36 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) socket$inet6(0xa, 0x2, 0x0) 16:44:36 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:36 executing program 0: ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x46f}, 0x28) 16:44:36 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:36 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$loop(0x0, 0x0, 0x100082) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r1, @ANYRES16=r2, @ANYRESHEX=r3, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r4], 0x106) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r3, r6, r7) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) 16:44:36 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setreuid(0xee00, r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:36 executing program 0: ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) 16:44:36 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x20000000}]}]}, 0x20}}, 0x0) 16:44:36 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x470}, 0x28) 16:44:36 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setreuid(0xee00, r2) 16:44:36 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$loop(0x0, 0x0, 0x100082) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r1, @ANYRES16=r2, @ANYRESHEX=r3, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r4], 0x106) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r3, r6, r7) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) 16:44:37 executing program 0: ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:37 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x471}, 0x28) 16:44:37 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xee00, r2) 16:44:37 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x3f000000}]}]}, 0x20}}, 0x0) 16:44:37 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYRESHEX=r2, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r3], 0x106) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r2, r5, r6) 16:44:37 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "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"}) 16:44:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x472}, 0x28) 16:44:37 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xee00, r2) 16:44:37 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) [ 1844.722681] validate_nla: 4 callbacks suppressed [ 1844.722690] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:37 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYRESHEX=r2, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r3], 0x106) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(r2, r5, 0x0) 16:44:37 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "9bfa42da4b758719efea63d23dee5704b840d9f8afcbcda006e528ea1bba1e9885b25d11ddc151023ba847939b669898210e346395484cd6fdd66112622129038b7c174cd4f89e3ff6179dae48d3341d4302122d028168647b464a27b9446e5281a9349d1ce6e1c95d370a4f6d4cd7ff347a059c4becc137b1cdf23078af270c3ba7ed1476a08ae796972f1c498aeaf8a687109287098106ceaccc73d28dcd57194c714775a92ec44c2c30fa4a0aa37bdf3d29c1c7428274783716ccf06d45270426f179ba3c99cde4ba4d503d7cb590658bf62b4759fdee7cca01c7bd574c08c4939f35a2f0beacb3f23fff1de0ac13ff2b83d0ad989699b5e38b92235a234f88b687f02aa9ca5aee2d9c3900a74894bc730e2e780e940aa035eb57878a38862863bb136a5765d85751998960a596fb4d3c830db0e997f0b3ecf23daa9fd2cde58130beb3864d8bb856d5cadcfd1f996e5bb91b6d1d772f19bd0ce29b129172dcb345b2bbb61259ab17b4a41353b96c9c41991878fa43076c6838d7696f1edd42968758ee6af1cde67ae6df4f799cfebd4a2f3d5fc8bddb2e4a1fa658bad5cd7be339ca7c482af0c1369a6a4e29672a8fd0ff4472f36376003045598c9abad8cce03e4699233607447a310bad2410b84b3f657e00ffef489c4c8ffe67644e63c71403f2b220e74c1573f0bed2e40b224c5ca7e149f71bb50e6b858f46148832"}) 16:44:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x473}, 0x28) 16:44:37 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:37 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x48000000}]}]}, 0x20}}, 0x0) 16:44:37 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYRESHEX=r2, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r3], 0x106) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) setresgid(r2, 0x0, 0x0) 16:44:37 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xee00, r2) 16:44:37 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x75, "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"}) [ 1845.022814] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x474}, 0x28) 16:44:37 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYRESHEX=r2, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r3], 0x106) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) setresgid(r2, 0x0, 0x0) 16:44:37 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) setreuid(0xee00, 0x0) 16:44:37 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:37 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x4c000000}]}]}, 0x20}}, 0x0) 16:44:37 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, 0x0) 16:44:37 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) setreuid(0xee00, 0x0) 16:44:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x475}, 0x28) 16:44:37 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYRESHEX=r2, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r3], 0x106) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) setresgid(r2, 0x0, 0x0) 16:44:38 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) [ 1845.375201] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:38 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, 0x0) 16:44:38 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) setreuid(0xee00, 0x0) 16:44:38 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x60000000}]}]}, 0x20}}, 0x0) 16:44:38 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYRESHEX=r2, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r3], 0x106) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(r2, r5, 0x0) 16:44:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x476}, 0x28) 16:44:38 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, 0x0) 16:44:38 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:38 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setreuid(0xee00, r1) [ 1845.671478] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:38 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYRESHEX=r2, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r3], 0x106) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(r2, r4, 0x0) 16:44:38 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x0, "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"}) 16:44:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x477}, 0x28) 16:44:38 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setreuid(0xee00, r1) 16:44:38 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:38 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x68000000}]}]}, 0x20}}, 0x0) 16:44:38 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYRESHEX=r2, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r3], 0x106) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(r2, r4, 0x0) 16:44:38 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setreuid(0xee00, r1) 16:44:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x478}, 0x28) 16:44:38 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:38 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x0, "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"}) [ 1846.064956] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:38 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setreuid(0xee00, r2) 16:44:38 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYRESHEX=r2, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r3], 0x106) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(r2, r4, 0x0) 16:44:38 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x0, "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"}) 16:44:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x479}, 0x28) 16:44:38 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x6c000000}]}]}, 0x20}}, 0x0) 16:44:38 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setreuid(0xee00, r1) 16:44:38 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:39 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}, 0x0, 0x6000000}) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000000)={0x6da0, 0x1, 0x4, 0x40000, 0xb5f, {0x77359400}, {0x4, 0x1, 0x94, 0xff, 0x8d, 0x7, "65829836"}, 0x5, 0x4, @userptr=0x5, 0x9, 0x0, r3}) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:39 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) syz_open_dev$loop(0x0, 0x0, 0x100082) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(r1, r4, 0x0) 16:44:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x47a}, 0x28) [ 1846.479756] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:39 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) syz_open_dev$loop(0x0, 0x0, 0x100082) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) socket(0x10, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(r1, r3, 0x0) 16:44:39 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setreuid(0xee00, r1) 16:44:39 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:39 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x74000000}]}]}, 0x20}}, 0x0) 16:44:39 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}, 0x0, 0x6000000}) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000000)={0x6da0, 0x1, 0x4, 0x40000, 0xb5f, {0x77359400}, {0x4, 0x1, 0x94, 0xff, 0x8d, 0x7, "65829836"}, 0x5, 0x4, @userptr=0x5, 0x9, 0x0, r3}) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x47b}, 0x28) 16:44:39 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) syz_open_dev$loop(0x0, 0x0, 0x100082) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(r1, r3, 0x0) 16:44:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setreuid(0xee00, r1) 16:44:39 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}, 0x0, 0x6000000}) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000000)={0x6da0, 0x1, 0x4, 0x40000, 0xb5f, {0x77359400}, {0x4, 0x1, 0x94, 0xff, 0x8d, 0x7, "65829836"}, 0x5, 0x4, @userptr=0x5, 0x9, 0x0, r3}) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) [ 1846.774686] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x47c}, 0x28) 16:44:39 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:39 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x7a000000}]}]}, 0x20}}, 0x0) 16:44:39 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) syz_open_dev$loop(0x0, 0x0, 0x100082) socket(0x10, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) 16:44:39 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) setreuid(0xee00, r0) 16:44:39 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}, 0x0, 0x6000000}) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000000)={0x6da0, 0x1, 0x4, 0x40000, 0xb5f, {0x77359400}, {0x4, 0x1, 0x94, 0xff, 0x8d, 0x7, "65829836"}, 0x5, 0x4, @userptr=0x5, 0x9, 0x0, r3}) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x47d}, 0x28) [ 1847.087925] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:39 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) setreuid(0xee00, r0) 16:44:39 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) syz_open_dev$loop(0x0, 0x0, 0x100082) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) 16:44:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:39 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}, 0x0, 0x6000000}) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:39 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0x9effffff}]}]}, 0x20}}, 0x0) 16:44:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x47e}, 0x28) 16:44:39 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) setreuid(0xee00, r0) 16:44:40 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) [ 1847.395999] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000c34000)) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x47f}, 0x28) 16:44:40 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xba580000}]}]}, 0x20}}, 0x0) 16:44:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) setreuid(0xee00, 0x0) 16:44:40 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) 16:44:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) userfaultfd(0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) [ 1847.681212] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x480}, 0x28) 16:44:40 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) setreuid(0xee00, 0x0) 16:44:40 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xc00e0000}]}]}, 0x20}}, 0x0) 16:44:40 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r0, 0x0) 16:44:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x481}, 0x28) 16:44:40 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r0, 0x0) 16:44:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) setreuid(0xee00, 0x0) 16:44:40 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x482}, 0x28) 16:44:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r1) setreuid(0xee00, r1) 16:44:40 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xf0ffffff}]}]}, 0x20}}, 0x0) 16:44:40 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r0, 0x0) 16:44:40 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r1) setreuid(0xee00, r1) 16:44:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) 16:44:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x483}, 0x28) 16:44:41 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:41 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) 16:44:41 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xfffff000}]}]}, 0x20}}, 0x0) 16:44:41 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r1) setreuid(0xee00, r1) 16:44:41 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x484}, 0x28) 16:44:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) 16:44:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(0x0) setreuid(0xee00, r1) 16:44:41 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xffffff7f}]}]}, 0x20}}, 0x0) 16:44:41 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x485}, 0x28) 16:44:41 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(0x0) setreuid(0xee00, r1) 16:44:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, r1, 0x0) 16:44:41 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:41 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xffffff9e}]}]}, 0x20}}, 0x0) 16:44:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, r1, 0x0) 16:44:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(0x0) setreuid(0xee00, r1) 16:44:41 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x486}, 0x28) 16:44:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setreuid(0xee00, 0x0) 16:44:41 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, r1, 0x0) 16:44:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x487}, 0x28) 16:44:42 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xfffffff0}]}]}, 0x20}}, 0x0) 16:44:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setresgid(0x0, 0x0, 0x0) 16:44:42 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x7fff, 0x6c5}) 16:44:42 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:42 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x488}, 0x28) 16:44:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setresgid(0x0, 0x0, 0x0) 16:44:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:42 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x7fff, 0x6c5}) 16:44:42 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5, 0x2, 0xffffffff}]}]}, 0x20}}, 0x0) 16:44:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setresgid(0x0, 0x0, 0x0) 16:44:42 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:42 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x7fff, 0x6c5}) [ 1849.865627] validate_nla: 6 callbacks suppressed [ 1849.865637] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x489}, 0x28) 16:44:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0xc, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}]}, 0x3c}}, 0x0) 16:44:42 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:42 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:42 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x7fff, 0x6c5}) 16:44:42 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0xa}}, 0x0) 16:44:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x48a}, 0x28) 16:44:42 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:42 executing program 1: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000000)={0x7fff, 0x6c5}) 16:44:42 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0xc, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}]}, 0x3c}}, 0x0) 16:44:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x48b}, 0x28) 16:44:43 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:43 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0xf}}, 0x0) 16:44:43 executing program 1: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000000)={0x7fff, 0x6c5}) 16:44:43 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:43 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:43 executing program 1: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000000)={0x7fff, 0x6c5}) 16:44:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x48c}, 0x28) 16:44:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0xc, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}]}, 0x3c}}, 0x0) 16:44:43 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000000)={0x7fff, 0x6c5}) 16:44:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0xc, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}]}, 0x3c}}, 0x0) 16:44:43 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x13}}, 0x0) 16:44:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x48d}, 0x28) 16:44:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:43 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000000)={0x7fff, 0x6c5}) 16:44:43 executing program 5 (fault-call:4 fault-nth:0): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x48e}, 0x28) 16:44:43 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) 16:44:43 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x14}}, 0x0) 16:44:43 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000000)={0x7fff, 0x6c5}) 16:44:43 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) [ 1851.216009] FAULT_INJECTION: forcing a failure. [ 1851.216009] name failslab, interval 1, probability 0, space 0, times 0 16:44:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x48f}, 0x28) [ 1851.282583] CPU: 0 PID: 28321 Comm: syz-executor.3 Not tainted 4.19.102-syzkaller #0 [ 1851.290528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.299909] Call Trace: [ 1851.302558] dump_stack+0x197/0x210 [ 1851.306219] should_fail.cold+0xa/0x1b [ 1851.310146] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1851.315304] ? lock_downgrade+0x880/0x880 [ 1851.319477] __should_failslab+0x121/0x190 [ 1851.323760] should_failslab+0x9/0x14 16:44:43 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x2, 0x0) [ 1851.323779] kmem_cache_alloc+0x2ae/0x700 [ 1851.323801] ? creds_are_invalid+0x59/0x150 16:44:44 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x25}}, 0x0) [ 1851.323819] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1851.323840] ? __validate_process_creds+0x1d9/0x300 16:44:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x490}, 0x28) [ 1851.323865] prepare_creds+0x3e/0x410 [ 1851.323884] __sys_setresgid+0x156/0x6d0 [ 1851.323905] __x64_sys_setresgid+0x73/0xb0 [ 1851.323926] do_syscall_64+0xfd/0x620 16:44:44 executing program 3 (fault-call:2 fault-nth:1): r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) [ 1851.323950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1851.323964] RIP: 0033:0x45b399 16:44:44 executing program 3 (fault-call:2 fault-nth:2): r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) 16:44:44 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x28}}, 0x0) [ 1851.323983] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:44:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x491}, 0x28) [ 1851.323993] RSP: 002b:00007fcaee63ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000077 [ 1851.324011] RAX: ffffffffffffffda RBX: 00007fcaee63b6d4 RCX: 000000000045b399 [ 1851.324022] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: 0000000000000000 [ 1851.324032] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:44:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) [ 1851.324042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1851.324052] R13: 00000000000009ef R14: 00000000004c1426 R15: 0000000000000000 [ 1851.480169] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1851.589433] FAULT_INJECTION: forcing a failure. [ 1851.589433] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.589455] CPU: 1 PID: 28736 Comm: syz-executor.3 Not tainted 4.19.102-syzkaller #0 [ 1851.589465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.589470] Call Trace: [ 1851.589495] dump_stack+0x197/0x210 [ 1851.589519] should_fail.cold+0xa/0x1b [ 1851.589539] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1851.589556] ? lock_downgrade+0x880/0x880 [ 1851.589581] __should_failslab+0x121/0x190 [ 1851.589597] should_failslab+0x9/0x14 [ 1851.589612] __kmalloc_track_caller+0x2de/0x750 [ 1851.589632] ? selinux_cred_prepare+0x49/0xb0 [ 1851.589649] kmemdup+0x27/0x60 [ 1851.589666] selinux_cred_prepare+0x49/0xb0 [ 1851.589686] security_prepare_creds+0x77/0xc0 [ 1851.589707] prepare_creds+0x332/0x410 [ 1851.589723] __sys_setresgid+0x156/0x6d0 [ 1851.589741] __x64_sys_setresgid+0x73/0xb0 [ 1851.589760] do_syscall_64+0xfd/0x620 [ 1851.589779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1851.589790] RIP: 0033:0x45b399 [ 1851.589805] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1851.589813] RSP: 002b:00007fcaee63ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000077 [ 1851.589828] RAX: ffffffffffffffda RBX: 00007fcaee63b6d4 RCX: 000000000045b399 16:44:44 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, 0x0) 16:44:44 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x2b}}, 0x0) 16:44:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x492}, 0x28) 16:44:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ftruncate(r2, 0x400) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0x4, @tick=0xf8, 0x0, {0x80, 0x9}, 0x5c, 0x7, 0x3f}) setresgid(0x0, r1, 0x0) 16:44:44 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b2f, 0x0) 16:44:44 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) [ 1851.589837] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: 0000000000000000 [ 1851.589845] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1851.589853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1851.589862] R13: 00000000000009ef R14: 00000000004c1426 R15: 0000000000000001 [ 1851.688989] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1852.102801] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x493}, 0x28) 16:44:44 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:44 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, 0x0) 16:44:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = semget(0x1, 0x3, 0x4) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000080)) setresgid(0x0, r1, 0x0) 16:44:44 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x2d}}, 0x0) 16:44:44 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b30, 0x0) 16:44:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x494}, 0x28) 16:44:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet6(0xa, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, 0x0) [ 1852.402392] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:45 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b31, 0x0) 16:44:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:45 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x30}}, 0x0) 16:44:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x495}, 0x28) 16:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x4d, 0xfffffffc}, {0x100, 0x7fffffff}], r2}, 0x18, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r4 = syz_open_dev$loop(0x0, 0x0, 0x100082) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r4, @ANYRES16=r5, @ANYRESHEX=r6, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r7], 0x106) setresgid(r6, r3, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000140)) 16:44:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:45 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b32, 0x0) 16:44:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)) 16:44:45 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x35}}, 0x0) 16:44:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x496}, 0x28) 16:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x101000, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f00000000c0)={0x80000000, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) setresgid(0x0, r1, 0x0) 16:44:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)) [ 1852.986409] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:45 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b33, 0x0) 16:44:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:45 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x60}}, 0x0) 16:44:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)) 16:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) socket$vsock_dgram(0x28, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ftruncate(r2, 0x400) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0x200, @loopback, 0x7, 0x1}, 0x20) setresgid(0x0, r1, 0x0) 16:44:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x497}, 0x28) 16:44:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:45 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)) [ 1853.310899] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$KDGKBSENT(r0, 0x4b41, 0x0) 16:44:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x498}, 0x28) 16:44:46 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setresgid(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000008c0)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) r2 = openat$cgroup_ro(r1, &(0x7f0000000800)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000840)=0xe1, 0x1) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000001c0)={0x0}) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x5, &(0x7f0000000540)=[{&(0x7f0000000240)="b91101a698aa6512b6b51ceff38f9b4160e26b6fe1d62d2751b50bfeecc34de2f16d61b535e2bbf9320fcd5386c3a52bc3c8121a7983711998233a87c7c8f87b3e15e639a59380cbe1e9706197d289edbcfe3e406814d4d72f90c626d2908bca2cbbe2fc3ea9e0cae4e9f009149f65ee7b7e", 0x72, 0x8}, {&(0x7f00000002c0)="b246c42addb44547475aeab44ab23995fdcb259ba2e40959356ea7391f10e2489cdda9bee6938f3d9cc0f968d1dad0dedd3623098f58dc8842adcbeb66f8c20722af4f7784a582f8819a459b17856408cfa43c580d633ecad17098eaea7e6fecde07d2434f550f69264964fe8bf1acabebe3", 0x72, 0x3ff}, {&(0x7f0000000340)="599681b35ea1477a217ae4341c40524173756d26daabfe6d740a1758887a7c1c755f40feafbe2f39e055b3d5f196a1b8a45404a1132f9d32df6efeeefacd7b47e8edb2aed1812c46d6a25344d3546a2e6d0ab7019ebec0fd38244158d0e1a99e2f015472af3d117cf6cb4e87b37581f6e542f9b87bcc835bc84f073e236b870df01a54941069a0e119b6ccf6045b44e7fa9b272e9f766e7201fe47e07f90755a57a5bd0ba06759", 0xa7, 0x20}, {&(0x7f0000000400)="c2", 0x1, 0x3}, {&(0x7f0000000440)="4b3eb291535b5dfcbe2862612c977b36c9ba8d901ed350d4a86ed319ba57ce75af2a216c52b95e568b6510abdf5b7fb76b288d2684d1e7aa903d44e940ff40596940028c1257d2dfe1d3d52939a8a21e8cbc7663a656d1c0b7590f9cfc08a3fbabd1b5867a60b53b1afe8cd513dadb9aed019410b3415a48e4e25c3ef9c21ed20a45b330fae67ee7bb50a6ef2175e035cc288c1d8fd3107f7e693c41937e44e1346ae1f60c6798738c32c96e087560376e4a97fb69d288414994140a27cc2d050c920caf6a1ee562cd1269", 0xcb, 0x9}], 0x2009000, &(0x7f0000000900)=ANY=[@ANYBLOB='unhide,iocharset=koi8-u,map=acorn,dmode=0x0000000000000004,map=acorn,block=0x0000000000000a00,unhide,block=0x0000000000000400,gid=', @ANYRESHEX=0xee00, @ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',obj_role=cgroup.controllers\x00,\x00']) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000180)={r3, &(0x7f0000000080)=""/199}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) 16:44:46 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0xc0}}, 0x0) 16:44:46 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b35, 0x0) 16:44:46 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x499}, 0x28) [ 1853.674563] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:46 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:46 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:46 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0xec0}}, 0x0) 16:44:46 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b36, 0x0) 16:44:46 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockname(r0, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000240)=0x80) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f00000000c0)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ftruncate(r4, 0x400) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000180)=0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r4, 0xc058534f, &(0x7f0000000100)={{0x1f, 0x7}, 0x1, 0xff, 0x1, {0x81, 0x7}}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) read$char_usb(r6, &(0x7f0000000280)=""/235, 0xeb) setresgid(0x0, r2, 0x0) 16:44:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x49a}, 0x28) 16:44:46 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b41, 0x0) 16:44:46 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x2, &(0x7f0000000000)={0x0, 0x6c5}) [ 1854.016255] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x49b}, 0x28) 16:44:46 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b37, 0x0) 16:44:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:46 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b2f, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r3, 0x110, 0x5, &(0x7f00000000c0)=[0x3, 0x1], 0x2) 16:44:46 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x33fe0}}, 0x0) 16:44:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x49c}, 0x28) 16:44:46 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b30, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b3a, 0x0) [ 1854.390670] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:47 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20000560}}, 0x0) 16:44:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x49d}, 0x28) 16:44:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2, 0x80000) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f00000000c0)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x13a2}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x100, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x16814}, 0x48480) setresgid(0x0, r1, 0x0) 16:44:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b32, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b3b, 0x0) 16:44:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x49e}, 0x28) 16:44:47 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x7ffff000}}, 0x0) 16:44:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b33, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b3c, 0x0) 16:44:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x49f}, 0x28) 16:44:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b34, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:47 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x2}, 0x0) 16:44:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b35, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4a0}, 0x28) 16:44:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b3d, 0x0) 16:44:48 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:48 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x4}, 0x0) 16:44:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4a1}, 0x28) 16:44:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:48 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b37, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b40, 0x0) 16:44:48 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r1 = syz_open_dev$loop(0x0, 0x0, 0x100082) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r1, @ANYRES16=r2, @ANYRESHEX=r3, @ANYBLOB="bea40876cad9e2e721129ed845c07a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067fe8b030392011d8c65e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517", @ANYPTR, @ANYRESOCT=r4], 0x106) r5 = syz_open_dev$loop(0x0, 0x0, 0x100082) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r5, @ANYRES16=r6, @ANYRESHEX=r7, @ANYBLOB="bea408761fd9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890200000053a8174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b35488c000000000000002b62000000007ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f84b9fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r8], 0x106) r9 = syz_open_dev$loop(0x0, 0x0, 0x100082) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES16=r9, @ANYRES16=r10, @ANYRESHEX=r11, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e261b639103df16b7e4cea229a48c866522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba20000000dcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r12], 0x106) r13 = syz_open_dev$loop(0x0, 0x0, 0x100082) r14 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRES16=r13, @ANYRES16=r14, @ANYRESHEX=r15, @ANYBLOB="bea40876291e70985c7290cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba0900f6044540b56886ae609bb95fd01bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877c7857fd80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404eff7f00000bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r16], 0x106) r17 = syz_open_dev$loop(0x0, 0x0, 0x100082) r18 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r20 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r17, @ANYRES16=r18, @ANYRESHEX=r19, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r20], 0x106) setresgid(r15, r19, r0) r21 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r21, 0x0) ftruncate(r21, 0x400) ioctl$VT_OPENQRY(r21, 0x5600, &(0x7f0000000000)) 16:44:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4a2}, 0x28) 16:44:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:48 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x8}, 0x0) 16:44:48 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4a3}, 0x28) 16:44:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}, 0x0, 0x6000000}) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000080)="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") 16:44:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b44, 0x0) 16:44:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:48 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x15}, 0x0) 16:44:48 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b3b, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4a4}, 0x28) 16:44:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b45, 0x0) 16:44:48 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x11, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080)={r6, 0x1000, 0x20}, 0xc) setresgid(0x0, r0, 0x0) 16:44:48 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b3c, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:49 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x25}, 0x0) 16:44:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4a5}, 0x28) 16:44:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b3d, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b46, 0x0) 16:44:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b34, 0x0) 16:44:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b40, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x65e99fe4abb29818}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r4, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x40}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x1040) setresgid(0x0, r1, 0x0) 16:44:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4a6}, 0x28) 16:44:49 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x28}, 0x0) 16:44:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b34, 0x0) 16:44:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b41, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b47, 0x0) 16:44:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4a7}, 0x28) 16:44:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b44, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:49 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x2b}, 0x0) 16:44:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b34, 0x0) 16:44:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = syz_open_dev$loop(0x0, 0x0, 0x100082) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r2, @ANYRES16=r3, @ANYRESHEX=r4, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5df61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66c0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r5], 0x106) getegid() connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}, 0x1, 0x3, 0x1, 0x2}}, 0x2e) r6 = syz_open_dev$loop(0x0, 0x0, 0x100082) r7 = socket(0x10, 0x2, 0x0) r8 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r8, 0xc0285629, &(0x7f00000001c0)={0x0, 0x1, 0x2, [], &(0x7f0000000180)=0x8}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r6, @ANYRES16=r7, @ANYRESHEX=r9, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r10], 0x106) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r11, r1, r9) 16:44:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b48, 0x0) 16:44:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4a8}, 0x28) 16:44:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:49 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x2d}, 0x0) 16:44:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4a9}, 0x28) 16:44:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b49, 0x0) 16:44:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b47, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b48, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4aa}, 0x28) 16:44:50 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x30}, 0x0) 16:44:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b4a, 0x0) 16:44:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ab}, 0x28) 16:44:50 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x35}, 0x0) 16:44:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4a, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b4b, 0x0) 16:44:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ac}, 0x28) 16:44:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4b, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b4c, 0x0) 16:44:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ad}, 0x28) 16:44:50 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x600}, 0x0) 16:44:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ae}, 0x28) 16:44:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4e, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b4d, 0x0) 16:44:51 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x753b9ad9}, 0x0) 16:44:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4af}, 0x28) 16:44:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b60, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b4e, 0x0) 16:44:51 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x753b9adf}, 0x0) 16:44:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4b0}, 0x28) 16:44:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b61, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4b1}, 0x28) 16:44:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b52, 0x0) 16:44:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:51 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0xffffff1f}, 0x0) 16:44:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b62, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4b2}, 0x28) 16:44:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b34, 0x0) 16:44:52 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x2}, 0x0) 16:44:52 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b63, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4b3}, 0x28) 16:44:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b61, 0x0) [ 1859.612201] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:52 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b34, 0x0) 16:44:52 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4b4}, 0x28) 16:44:52 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x3}, 0x0) 16:44:52 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b34, 0x0) 16:44:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b62, 0x0) 16:44:52 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b65, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4b5}, 0x28) [ 1859.945944] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:52 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b34, 0x0) 16:44:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b63, 0x0) 16:44:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4b6}, 0x28) 16:44:52 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x4}, 0x0) 16:44:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:52 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b66, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:52 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x101000, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000580)='wireguard\x00') r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local}, &(0x7f0000000600)=0xc) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001040)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f0000001000)={&(0x7f0000000640)={0x984, r1, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x401}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wireguard0\x00'}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e20}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PEERS={0x924, 0x8, 0x0, 0x1, [{0x24c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x248, 0x9, 0x0, 0x1, [{0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0xb}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x18}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x1d}}, {0x5, 0x3, 0x7a}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x76}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0xd}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1b}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0xd}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x71}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1b}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x71}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x14}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x6}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x76}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr="b5314ec9fed194d44c9706891e0f06f3"}, {0x5, 0x3, 0x2c}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5, 0x3, 0x62}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x39}}, {0x5, 0x3, 0x1f}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x11}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x13}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr="4aba299c9cd5f6b42161400c871efa0f"}, {0x5, 0x3, 0x23}}]}]}]}, {0x3f8, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "b5bd4f76e395f021ff557d23a121562bb21e9363e3c653309b996ca8668ce0a3"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xfffc}, @WGPEER_A_ALLOWEDIPS={0x3b8, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x62}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0xf}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0xb}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x14}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x39}}, {0x5, 0x3, 0x2e}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x10}}]}, {0x4}, {0x118, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x21}}, {0x5, 0x3, 0x1e}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x6d}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0xf}}, {0x5, 0x3, 0x55}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr="c9938151477d87917c0d4f5a236f7231"}, {0x5, 0x3, 0x5a}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x10}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x15}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1e}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0xa}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1e}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x80}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3a}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x13}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0xe4}, {0x5, 0x3, 0xd}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x13}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0xf}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @loopback}}, {0x5, 0x3, 0x12}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x15}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x6}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0xe}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x73}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x58}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x14}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x20}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @rand_addr=0x2}}, {0x5, 0x3, 0x48}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}]}, {0x11c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @empty}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "caa17c8d482af82785d92e8248c58a109c3a649fa4da333e496151f51fbf8bfe"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "28b8baa76ef506e83f8eea4e350cacf3a91a6082050293fb543a1b243e3a91e3"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "b3dbc5a4b70bcd9b792f956c7e46c96455524b71f2071be70d34cc575de90819"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @multicast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x9, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x7}}]}, {0x20, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @remote}}]}, {0x124, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0xd8, 0x9, 0x0, 0x1, [{0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5, 0x3, 0x74}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x19}}, {0x5, 0x3, 0x75}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x3}, {0x5, 0x3, 0x13}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x6}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x13}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x15}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x23}}]}, {0x4}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a}]}, {0x4}, {0x58, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "9ecb260c894db9a664e4ae6ed8ea2917910c65dc95d44860d9fc1d2e1b3d469b"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x3f, @remote, 0x3}}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3}]}, {0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}]}, @WGDEVICE_A_FLAGS={0x8}]}, 0x984}, 0x1, 0x0, 0x0, 0x8010}, 0x24008000) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r6, 0x0) [ 1860.274469] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4b7}, 0x28) 16:44:53 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x5}, 0x0) 16:44:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b64, 0x0) 16:44:53 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b67, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:53 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x10100, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) [ 1860.526178] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4b8}, 0x28) 16:44:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:53 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x6}, 0x0) 16:44:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b65, 0x0) 16:44:53 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b68, &(0x7f0000000000)={0x0, 0x6c5}) [ 1860.801661] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4b9}, 0x28) 16:44:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x61a081, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000000c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) r2 = syz_open_dev$loop(0x0, 0x0, 0x100082) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r2, @ANYRES16=r3, @ANYRESHEX=r4, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r5], 0x106) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r4, r6, 0x0) 16:44:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b66, 0x0) 16:44:53 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b69, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:53 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x7}, 0x0) 16:44:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ba}, 0x28) 16:44:53 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) accept4$llc(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xfffffffffffffee6) socket$inet6_udp(0xa, 0x2, 0x0) setresgid(0x0, r2, 0x0) [ 1861.111575] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:53 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b6a, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4bb}, 0x28) 16:44:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b67, 0x0) 16:44:53 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x48}, 0x0) 16:44:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0xfb, 0xff, 0x6, 0x80, 0x0, 0x1, 0x40000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x40, 0xbad5, 0x1, 0x7, 0x2, 0x7, 0x1f}, r3, 0xf, r5, 0xf) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x13, 0xfc, 0x9, 0x0, 0x800, 0x10000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x1, 0x76}, 0x20000, 0x2, 0x38, 0x3, 0xd2f7, 0xfffffc01, 0x8}, 0xffffffffffffffff, 0x5, r6, 0x8) setresgid(0x0, r1, 0x0) 16:44:54 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b6b, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4bc}, 0x28) [ 1861.440556] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:54 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b68, 0x0) 16:44:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x63, 0x2) socket(0x28, 0x5, 0x85) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x505080, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setresgid(0x0, r2, 0x0) 16:44:54 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4bd}, 0x28) 16:44:54 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x4c}, 0x0) 16:44:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:54 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b69, 0x0) 16:44:54 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b6d, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4be}, 0x28) 16:44:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/user\x00', 0x2, 0x0) 16:44:54 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x60}, 0x0) 16:44:54 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b70, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:54 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b6a, 0x0) [ 1862.126157] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x4, 0xc, 0x4, 0x20000, 0x8e, {0x77359400}, {0x4, 0x8, 0x5, 0x4, 0x1, 0x6, "f8e4b917"}, 0x2, 0x3, @offset=0x400, 0x4, 0x0, r2}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0xd89}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f0000000180)={r4}) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet6(0xa, 0x0, 0x2) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r9, 0xc0485630, &(0x7f0000000240)={0xf26, "303da381d59a7f6b924079249de691732800", 0x1, 0xfffffff1, 0x3, 0x7, 0x2}) ioctl$DRM_IOCTL_MODE_ADDFB2(r7, 0xc06864b8, &(0x7f00000001c0)={0x81, 0x3ff, 0x2, 0x5, 0x2, [0x9, 0x5, 0x7, 0x4], [0x33bb, 0x6, 0x80000001, 0x2], [0x7, 0x5, 0x5, 0x2], [0x4, 0x1, 0x3, 0x20]}) ioctl$DRM_IOCTL_MODE_RMFB(r5, 0xc00464af, &(0x7f0000000080)=0x80000000) 16:44:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4bf}, 0x28) 16:44:54 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b71, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:54 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x68}, 0x0) 16:44:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b60, 0x0) 16:44:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4c0}, 0x28) 16:44:55 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b6b, 0x0) [ 1862.458591] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:55 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b72, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b60, 0x0) 16:44:55 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x6c}, 0x0) 16:44:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4c1}, 0x28) 16:44:55 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4bfa, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b60, 0x0) 16:44:55 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b6c, 0x0) [ 1862.766173] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4c2}, 0x28) 16:44:55 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4bfb, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:55 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x74}, 0x0) 16:44:55 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5409, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4c3}, 0x28) 16:44:55 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b6d, 0x0) 16:44:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:55 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x540b, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4c4}, 0x28) 16:44:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:56 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x7a}, 0x0) 16:44:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x540c, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:56 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b70, 0x0) 16:44:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4c5}, 0x28) 16:44:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x540d, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:56 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0xf0}, 0x0) 16:44:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4c6}, 0x28) 16:44:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:56 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b71, 0x0) 16:44:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x540e, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4c7}, 0x28) 16:44:56 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x300}, 0x0) 16:44:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x540f, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:56 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b72, 0x0) 16:44:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4c8}, 0x28) 16:44:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:56 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x500}, 0x0) 16:44:57 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5410, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4c9}, 0x28) 16:44:57 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4bfa, 0x0) 16:44:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:57 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5412, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ca}, 0x28) 16:44:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:57 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x600}, 0x0) 16:44:57 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5413, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:57 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x4bfb, 0x0) 16:44:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4cb}, 0x28) [ 1864.798049] validate_nla: 4 callbacks suppressed [ 1864.798058] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="50b9d97d", @ANYRES16=r3, @ANYBLOB="010000000000000000000100000000000000030000000014001462726f6164636173742d6c696e6b0000"], 0x30}}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="20002dbd7000ffdbdf2502000000050001000072656775617264300000000000"], 0x3}, 0x1, 0x0, 0x0, 0x10}, 0x44) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x7c, r4, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:tape_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400}, 0x84) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x20, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) 16:44:57 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:57 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5409, 0x0) 16:44:57 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x700}, 0x0) 16:44:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4cc}, 0x28) 16:44:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x200100, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r2, 0x80044d00, &(0x7f00000000c0)) 16:44:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4cd}, 0x28) 16:44:57 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5415, &(0x7f0000000000)={0x0, 0x6c5}) [ 1865.155157] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$KDGKBSENT(r0, 0x4b60, 0x0) 16:44:57 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x540b, 0x0) 16:44:57 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0xec0}, 0x0) 16:44:57 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5416, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xfffffcf9) setresgid(0x0, r4, 0x0) 16:44:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ce}, 0x28) 16:44:58 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b60, 0x0) [ 1865.510257] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5418, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:58 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x540c, 0x0) 16:44:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4cf}, 0x28) 16:44:58 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b60, 0x0) 16:44:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x10000, 0x0) recvmsg$can_raw(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/115, 0x73}, {&(0x7f0000000140)=""/235, 0xeb}], 0x2}, 0x41) setresgid(0x0, r1, 0x0) 16:44:58 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x2000}, 0x0) 16:44:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541b, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:58 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b60, 0x0) 16:44:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4d0}, 0x28) 16:44:58 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x540d, 0x0) [ 1865.845068] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:58 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) 16:44:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541c, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4d1}, 0x28) 16:44:58 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x3f00}, 0x0) 16:44:58 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541b, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:58 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x540e, 0x0) 16:44:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541d, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4d2}, 0x28) 16:44:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) newfstatat(0xffffffffffffff9c, &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0xfe, 0x5, &(0x7f00000025c0)=[{&(0x7f00000004c0)="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", 0x1000, 0x6}, {&(0x7f00000014c0)="1772251dbe8416a3baa6cfffddccefd79da8acd945715e106805b6fa3510575a3d5812af4a1e162b328d27827d7d20d85ee6036b83aca02d477c20e401b8aeed4abe2602e386a08de3cacc33b61d", 0x4e, 0x3}, {&(0x7f0000001540)="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", 0x1000, 0x5}, {&(0x7f0000000140)="b179c4f158f862ddcb868cc71df4476b9bc74b477b75849a451f211d45fe163afb2f98ef45901e151fd46e0a", 0x2c, 0x5170}, {&(0x7f0000002540)="8e91dc9fce7a00c4e738e5019c49c467fa489669870a9d24fbdc036b646921fde0c7ab3244a7dd9c76fba5bf0799fdeb7d69f9414d1d5e0e2323bf5933749d818887ee1fc524d2a9c070f66a2d0aa89b6ecf1c619ca03983bbdca6e61768d1d042295ebe8c08", 0x66}], 0x1000, &(0x7f0000002700)=ANY=[@ANYBLOB="63726561746f723ddb72b5b32c66696c655f756d61736b3d30303030303030303030303030303030303030323030302c66696c655f756d61736b3d30303030303030303030303030303030303030373737372c7375626a5f747970653d6367726f75702e636f6e74726f6c6c657273002c66756e633d46494c455f434845434b2c7569643e", @ANYRESDEC=r2, @ANYBLOB="146f626a5f74697065bd2c00"]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ftruncate(r3, 0x400) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x4, 0x20, 0x81, 0x8, 0x3}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000200)={r4}, &(0x7f0000000240)=0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000027c0)='/dev/vcs\x00', 0x480100, 0x0) ioctl$LOOP_GET_STATUS(r5, 0x4c03, &(0x7f0000002800)) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r7, 0x0) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000000280)=ANY=[@ANYBLOB="0800000000000000080000000000000003000000008000000400000000000000010000800000000001800000002f64ab737cb20d1fefaf0000000004000000000000000000000000000000000000280000000000000000000000000000f7ffffffffffffff0800000000000000040000000000000000000000000000000000000000000000080000000000000000000000000000005f00000000000000090000000000000006000000000000000000000000000000000000000000000002000000000000000000000000000000190c00000000000032060000000000002000000000000000000000000000000000000000000000008000"/266]) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet_buf(r9, 0x0, 0x2c, &(0x7f00000003c0)="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", 0xff) [ 1866.208286] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:58 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541b, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541e, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4d3}, 0x28) 16:44:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x540f, 0x0) 16:44:59 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x4800}, 0x0) 16:44:59 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541b, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5421, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4d4}, 0x28) 16:44:59 executing program 0: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x541b, &(0x7f0000000000)={0x0, 0x6c5}) [ 1866.646521] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5410, 0x0) 16:44:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5422, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=r3], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r3, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ftruncate(r4, 0x400) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setresgid(0x0, r1, 0x0) 16:44:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4d5}, 0x28) 16:44:59 executing program 0: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x541b, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:59 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x4c00}, 0x0) 16:44:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5412, 0x0) 16:44:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5423, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:59 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) 16:44:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4d6}, 0x28) [ 1867.056541] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:44:59 executing program 0: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x541b, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5424, &(0x7f0000000000)={0x0, 0x6c5}) 16:44:59 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x58ba}, 0x0) 16:44:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5413, 0x0) 16:44:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4d7}, 0x28) 16:45:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000000)={'syzkaller0\x00', 0x1}) 16:45:00 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x541b, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5425, &(0x7f0000000000)={0x0, 0x6c5}) [ 1867.437744] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:00 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x541b, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4d8}, 0x28) 16:45:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5414, 0x0) 16:45:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5427, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:00 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x6000}, 0x0) 16:45:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setresgid(0x0, r1, 0x0) 16:45:00 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x541b, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4d9}, 0x28) 16:45:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5428, &(0x7f0000000000)={0x0, 0x6c5}) [ 1867.784581] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5415, 0x0) 16:45:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541b, 0x0) 16:45:00 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x6800}, 0x0) 16:45:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5429, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4da}, 0x28) 16:45:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) getgid() r2 = syz_open_dev$loop(0x0, 0x0, 0x100082) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r2, @ANYRES16=r3, @ANYRESHEX=r4, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT], 0x106) r5 = syz_open_dev$loop(0x0, 0x0, 0x100082) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r5, @ANYRES16=r6, @ANYRESHEX=r7, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r8], 0x106) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) setresgid(r1, r1, r1) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000140)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r9, 0x0) ftruncate(r9, 0x400) bind$can_raw(r9, &(0x7f0000000100), 0x10) 16:45:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5416, 0x0) 16:45:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541b, 0x0) 16:45:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5437, &(0x7f0000000000)={0x0, 0x6c5}) [ 1868.161547] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4db}, 0x28) 16:45:00 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x6c00}, 0x0) 16:45:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541b, 0x0) 16:45:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = syz_open_dev$loop(0x0, 0x0, 0x100082) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket(0x1f, 0xa, 0x1) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES16=r2, @ANYRES16=r3, @ANYRESHEX=r4, @ANYBLOB="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", @ANYPTR, @ANYRESOCT=r5], 0x166) setresgid(r4, r1, 0x0) 16:45:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4dc}, 0x28) 16:45:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5418, 0x0) 16:45:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5441, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541b, &(0x7f0000000000)) 16:45:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5450, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syzkaller1\x00', 0x0}) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x100, 0x2}}, @can, @xdp={0x2c, 0x0, r5, 0x33}, 0xd842, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6, 0x8, 0x8000}) 16:45:01 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x7400}, 0x0) 16:45:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4dd}, 0x28) 16:45:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5437, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x541b, 0x0) 16:45:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5451, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4de}, 0x28) 16:45:01 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x7a00}, 0x0) 16:45:01 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000012c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x16, r1, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ftruncate(r2, 0x400) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000000)=0x3) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x2c) setresgid(0x0, r4, 0x0) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) write$FUSE_POLL(r5, &(0x7f0000000180)={0x18, 0x0, 0x2, {0xa6}}, 0x18) 16:45:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syzkaller1\x00', 0x0}) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x100, 0x2}}, @can, @xdp={0x2c, 0x0, r5, 0x33}, 0xd842, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6, 0x8, 0x8000}) 16:45:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x541c, 0x0) 16:45:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5452, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4df}, 0x28) 16:45:01 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0xba58}, 0x0) 16:45:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syzkaller1\x00', 0x0}) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x100, 0x2}}, @can, @xdp={0x2c, 0x0, r5, 0x33}, 0xd842, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6, 0x8, 0x8000}) 16:45:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x545d, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) setresgid(0x0, r1, r2) 16:45:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x541d, 0x0) 16:45:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4e0}, 0x28) 16:45:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5460, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000140)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000000c0)={{0x0, 0x0, @identifier="0cdeae5e745de75d6cc21221392e58f0"}}) setresgid(0x0, r2, 0x0) 16:45:02 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0xc00e}, 0x0) 16:45:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syzkaller1\x00', 0x0}) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x100, 0x2}}, @can, @xdp={0x2c, 0x0, r5, 0x33}, 0xd842, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6, 0x8, 0x8000}) 16:45:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5600, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x541e, 0x0) 16:45:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4e1}, 0x28) [ 1869.804334] validate_nla: 4 callbacks suppressed [ 1869.804349] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = getegid() r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x800) getpeername$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x10) setresgid(0x0, r1, r2) 16:45:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5601, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syzkaller1\x00'}) 16:45:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4e2}, 0x28) 16:45:02 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0xf000}, 0x0) 16:45:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5421, 0x0) 16:45:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x214040, 0x0) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000140)={0x18, 0x7f}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setresgid(0x0, r1, 0x0) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f00000000c0)=0x10001) 16:45:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5602, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4e3}, 0x28) 16:45:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) [ 1870.258011] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5422, 0x0) 16:45:03 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x34000}, 0x0) 16:45:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ftruncate(r2, 0x400) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'ipvlan0\x00', 0x8000}) ioctl$void(r1, 0x5450) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f00000001c0)={&(0x7f00001f0000/0x2000)=nil, &(0x7f0000718000/0x12000)=nil, 0x2000, 0x1}) ptrace$setregs(0xd, r3, 0x5cc2, &(0x7f0000000180)="52f72af5f376c35882a8b54c35763dead2585651686217794b9c34") r4 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000012c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$unlink(0x16, r5, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r5, 0x3f) 16:45:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4e4}, 0x28) 16:45:03 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5605, &(0x7f0000000000)={0x0, 0x6c5}) [ 1870.585922] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5423, 0x0) 16:45:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4e5}, 0x28) 16:45:03 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x400300}, 0x0) 16:45:03 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5606, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}, 0x0, 0x6000000}) r3 = fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000180)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) write$FUSE_CREATE_OPEN(r3, &(0x7f00000000c0)={0xa0, 0xfffffffffffffffe, 0x8, {{0x0, 0x1, 0x2, 0x7, 0x800, 0x2, {0x3, 0xfff, 0x0, 0x4, 0xa8dc, 0xa1d, 0xfff, 0x8, 0x1, 0x81, 0x6, r5, 0xee01, 0x2, 0x7}}, {0x0, 0xe}}}, 0xa0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ftruncate(r6, 0x400) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'team_slave_0\x00', @dev={[], 0xe}}) setresgid(0x0, r1, 0x0) 16:45:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5424, 0x0) 16:45:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4e6}, 0x28) 16:45:03 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5607, &(0x7f0000000000)={0x0, 0x6c5}) [ 1870.983380] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4e7}, 0x28) 16:45:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0xfff, &(0x7f0000000140)) r2 = syz_open_dev$loop(0x0, 0x0, 0x100082) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRES16=r2, @ANYRES16=r3, @ANYRESHEX=r4, @ANYBLOB="bea40876cad9e2e7c05a9ce7b0f7bbdc8cd4d9daf09f44f6b1186c259f5ee455f6c7e26166522c72c2890dd7118853880f4d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f5c04e04c56ef32f8487fcbe49bb131b00008804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37682e4c1e17f424e41cee00"/242, @ANYPTR, @ANYRESOCT=r5], 0x106) setresgid(0x0, r1, r4) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_ZEROPAGE(r7, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}, 0x0, 0x6000000}) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ubi_ctrl\x00', 0x200, 0x0) bind$inet6(r8, &(0x7f00000003c0)={0xa, 0x4e22, 0x80, @local, 0xa69b}, 0x1c) r9 = fcntl$dupfd(r7, 0x0, r6) ioctl$DRM_IOCTL_MARK_BUFS(r9, 0x40206417, &(0x7f00000000c0)={0x3ff, 0x1ff, 0x8000, 0x0, 0x8, 0xfe3}) r10 = dup(r6) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCSERGETLSR(r10, 0x5459, &(0x7f0000000080)) 16:45:03 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5608, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:03 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0xf0ffff}, 0x0) 16:45:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5425, 0x0) 16:45:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:03 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x5609, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4e8}, 0x28) [ 1871.326370] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:04 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5427, 0x0) 16:45:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:04 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x1000000}, 0x0) 16:45:04 executing program 3: readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/252, 0xfc) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x12880, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00') getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000002c0)=0x0, &(0x7f0000000300)=0x4) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x49002}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x28000000}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r8, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x2c, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_RSVP_PINFO={0x20, 0x4, {{}, {}, 0x0, 0x0, 0x2}}]}}]}, 0x5c}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r13, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r13, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r13, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x2c, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_RSVP_PINFO={0x20, 0x4, {{}, {}, 0x0, 0x0, 0x2}}]}}]}, 0x5c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x78, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x8b}, @ETHTOOL_A_LINKINFO_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x4}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x3}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x1}]}, 0x78}, 0x1, 0x0, 0x0, 0x1}, 0xc800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r14, 0x0) r15 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r15, 0x8905, &(0x7f0000000440)) 16:45:04 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560a, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4e9}, 0x28) 16:45:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) [ 1871.681256] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:04 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5428, 0x0) 16:45:04 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560b, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x2040) inotify_add_watch(r2, &(0x7f00000000c0)='./file0\x00', 0x1c0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$NFT_BATCH(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={{0x14}, [@NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x401, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}]}], {0x14}}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x800) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000840)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="1a01000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x6b0}, 0x1, 0x0, 0x0, 0x1}, 0x800) setresgid(0x0, r1, 0x0) 16:45:04 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x2000000}, 0x0) 16:45:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ea}, 0x28) 16:45:04 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5429, 0x0) 16:45:04 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560c, &(0x7f0000000000)={0x0, 0x6c5}) [ 1872.033872] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:04 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4eb}, 0x28) 16:45:04 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x3000000}, 0x0) 16:45:04 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560d, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:05 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x4000, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000180)=0x12000000, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x280) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000000c0)={0xff, 0xfffffff8, 0xac}, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r4 = syz_open_dev$loop(0x0, 0x0, 0x100082) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r4, @ANYRES16=r5, @ANYRESHEX=r6, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r7], 0x106) setresgid(0x0, r6, r3) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x80) 16:45:05 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5437, 0x0) [ 1872.476844] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ec}, 0x28) 16:45:05 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560e, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:05 executing program 0: socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:05 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x4000000}, 0x0) 16:45:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ed}, 0x28) 16:45:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5441, 0x0) 16:45:05 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="200000000b060101000000000000007f8f956c0739ff020173797a30000000002ef76a3d5dde857006b810f9c56ba6fdf59cd2696676e4d6a6c45f4132b357f916af46bcbcd3d7c828c2136da28d74c452e564a78dc240d9964a68ba7b7e171d5fd912acc8162c8de7b0285fcd47d2d010d9866123b1fdf3982b932e4f7ea0f5f492c73cd64bd1cb881bc1791c021f2d3171ff04bf5d0d8930ec08e7bb0389f9251ad26322e5ec2bec07642835b563f8edf020c5b766be68069c0c78f1d7f7aaa4f2abfb46acb9b0a4c1be1f07009b4d78d7297bcb9acace49396ea17f58fc2f21a6e2d93e4c24afced1e06a70000000000000"], 0x1}, 0x1, 0x0, 0x0, 0xd5}, 0x4000000) setresgid(0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) ioctl$SNDRV_PCM_IOCTL_LINK(r0, 0x40044160, &(0x7f00000000c0)=0x5) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000240)={{0xa, 0x4e23, 0x4, @rand_addr="9412855e6828e11b60d9bfada9f3308f", 0x40000000}, {0xa, 0x4e24, 0x4, @empty, 0x3}, 0x4, [0x80, 0x0, 0x3, 0x0, 0x7, 0x5, 0x7, 0x200]}, 0x5c) [ 1872.882359] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:05 executing program 0: socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ee}, 0x28) 16:45:05 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x5000000}, 0x0) 16:45:05 executing program 0: socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) 16:45:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5450, 0x0) 16:45:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200000, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x11, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000240)={r6, 0x6, 0x9ee8, 0x2}, &(0x7f0000000280)=0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r7, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008055}, 0x4000) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000000c0)={0x1, 0x0, 0x1}) [ 1873.201045] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:06 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560f, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4ef}, 0x28) 16:45:06 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, &(0x7f00000001c0)) 16:45:06 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x6000000}, 0x0) 16:45:06 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5451, 0x0) 16:45:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCDISCONN(r4, 0x7439) r5 = syz_open_dev$loop(0x0, 0x0, 0x100082) r6 = socket(0x10, 0x2, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r5, @ANYRES16=r6, @ANYRESHEX, @ANYBLOB="bea40876cad94eca21129ed845c05a9ce7b0f7bbf9cddc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca4643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37", @ANYPTR, @ANYRESOCT=r7], 0x106) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000100)={0xa0, 0x0, 0x6, {{0x6, 0x2, 0x8, 0x5e, 0x1, 0x0, {0x6, 0x6974, 0x1, 0x10001, 0x5, 0x34216e4c, 0x1, 0x5, 0xffff, 0x8000, 0xff, 0xee00, 0x0, 0x7fffffff}}, {0x0, 0x9}}}, 0xa0) ftruncate(r2, 0x400) getsockopt$PNPIPE_HANDLE(r2, 0x113, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 16:45:06 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) 16:45:06 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x40049409, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4f0}, 0x28) 16:45:06 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x7000000}, 0x0) 16:45:06 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5452, 0x0) 16:45:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = syz_open_dev$loop(0x0, 0x0, 0x100082) r2 = socket(0x26, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r1, @ANYRES16=r2, @ANYRESHEX=r3, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r4], 0x106) r5 = syz_open_dev$loop(0x0, 0x0, 0x100082) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRES16=r5, @ANYRES16=r6, @ANYRESHEX=r7, @ANYBLOB="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", @ANYPTR, @ANYRESOCT=r8], 0x106) r9 = syz_open_dev$loop(0x0, 0x0, 0x100082) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r9, @ANYRES16=r10, @ANYRESHEX=r11, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r12], 0x106) r13 = getgid() setresgid(r13, r11, 0x0) 16:45:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560f, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:06 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4f1}, 0x28) 16:45:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560f, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:06 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x545d, 0x0) 16:45:06 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x40087602, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:06 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x20000000}, 0x0) 16:45:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x101, 0x8002) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ftruncate(r2, 0x400) r3 = accept4$packet(r2, 0x0, &(0x7f0000000240), 0x80000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {0xa, 0x0, 0x9}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000001) ioctl$SNDCTL_DSP_SETDUPLEX(0xffffffffffffffff, 0x5016, 0x0) setresgid(0x0, r4, 0x0) 16:45:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4f2}, 0x28) 16:45:06 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4020940d, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560f, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:06 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5460, 0x0) 16:45:07 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x3f000000}, 0x0) 16:45:07 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x80045432, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4f3}, 0x28) 16:45:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f0000000080)=""/33) setresgid(0x0, r1, 0x0) 16:45:07 executing program 0: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x560f, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4f4}, 0x28) 16:45:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5600, 0x0) 16:45:07 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x80045440, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:07 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x48000000}, 0x0) 16:45:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ftruncate(r2, 0x400) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000080)={{0x74, 0x1}, 'port1\x00', 0x48, 0x80000, 0x1, 0x3, 0x1f, 0x3ff, 0x3, 0x0, 0x5, 0x2}) 16:45:07 executing program 0: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x560f, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4f5}, 0x28) [ 1874.868241] validate_nla: 4 callbacks suppressed [ 1874.868250] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:07 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x80086601, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:07 executing program 0: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x560f, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5601, 0x0) 16:45:07 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x4c000000}, 0x0) 16:45:07 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x80087601, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4f6}, 0x28) 16:45:07 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r0, 0x0, 0x0) 16:45:07 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x560f, &(0x7f0000000000)={0x0, 0x6c5}) [ 1875.220030] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:07 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5602, 0x0) 16:45:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4f7}, 0x28) 16:45:08 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x60000000}, 0x0) 16:45:08 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x560f, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:08 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:08 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5603, 0x0) 16:45:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}, 0x0, 0x6000000}) fstat(r2, &(0x7f0000000080)) r3 = syz_open_dev$loop(0x0, 0x0, 0x100082) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r3, @ANYRES16=r4, @ANYRESHEX=r5, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r6], 0x106) r7 = syz_open_dev$loop(0x0, 0x0, 0x100082) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r7, @ANYRES16=r8, @ANYRESHEX=r9, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r10], 0x106) r11 = syz_open_dev$loop(0x0, 0x0, 0x100082) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r14 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES16=r11, @ANYRES16=r12, @ANYRESHEX=r13, @ANYBLOB="bea40876cad9e2e721129ed845c05a9ce7b0f7bbdc8cd4c7e26166522c72c2890dd711885388174d9d6100067f8f95f10522c4fa4f26f8f0d8105e5f58d66f36fa7a06dbb62b5c5d0e3b2bba77a4f61bdcf18a0d8b3548483f29071ab1f2b52b62cb300f877ca6d678580b80e0ef23ec350c4f1abeca6643eb66004615f8c04e04c56ef32f8487fcbe49bb131b81d68804565a22ddd9eb6de7dcab1b2961a7b63a2a0df487404e1eebb66e0bce4233429b1d9e5b6969f7f10f61105a30b488068ef0fd84fef517fa38281850ac7f37a6d0", @ANYPTR, @ANYRESOCT=r14], 0x106) setresgid(r5, r13, r1) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000100)={{0x1, 0x5}, {0xff, 0x4}, 0x2, 0x1, 0x2}) [ 1875.595996] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:08 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4f8}, 0x28) 16:45:08 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x560f, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:08 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x68000000}, 0x0) 16:45:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setresgid(r1, r1, 0x0) 16:45:08 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5605, 0x0) 16:45:08 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:08 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560f, 0x0) [ 1875.933702] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:08 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x6c5}) 16:45:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4f9}, 0x28) 16:45:08 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560f, 0x0) 16:45:08 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x6c000000}, 0x0) 16:45:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xfffffffffffffdc2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = getpid() tkill(r5, 0x9) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000017c0)={0x4, 0x0, {r5}, {r1}, 0x6, 0x7ff}) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r8 = syz_open_dev$binderN(&(0x7f00000064c0)='/dev/binder#\x00', 0x0, 0x800) r9 = getpid() r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r11) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006540)={&(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000006440)=[{&(0x7f0000000140)={0x1674, 0x21, 0x10, 0x70bd25, 0x25dfdbfd, "", [@nested={0x100c, 0x4a, 0x0, 0x1, [@generic="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", @typed={0x8, 0x83, 0x0, 0x0, @uid=r4}]}, @generic="cb0ea71c145c727d2c48627e400afa57c8405c6fe45e8ebbf5d3824f5cb5923c2a5615f8e305350c37f4acfcb65129285e8629d85f7fe8d003262cb1752b58b49ebaac15b4cabd8987167837584ac15fd906c98c78f1922eeecf01eebe094dd652ba287ad9ac12eeacf73e9c6b8b5f3ffdf4796a483651f5fe6edee3a14b6a150105eb2963870bf236d14301ab591a09bd1abe7c3413ab9b9dd6a9f9f1207c30db2a15bcba55d01540585387efe724eaf11949653c2bf9f3b0", @nested={0x169, 0x45, 0x0, 0x1, [@typed={0x8, 0x3c, 0x0, 0x0, @ipv4=@remote}, @generic="fa9168b4fa48afd6fa8d04651dbd0fa01ac7aaacd795154ad4559eb5210f498c571f99f55d3847eb4f13913df5a974f8de8dc152323f5b48d4b74a5afb4134c10b6c57fdf902bf101128f1a2b7f9d58f5fedb458d648de052c604a908bfe07449fd2448f2d526e40a043a291f18a79c93d5dbad7fdef8ea5f48c0f80e7525ffdd9ccd225ba5b8ca70b68256b4a85274d473b4fc7a9", @typed={0x14, 0x14, 0x0, 0x0, @ipv6=@empty}, @typed={0xb3, 0x46, 0x0, 0x0, @binary="b1fb6efaec4bd006707bb67c34d6730cbfa904e8b2593a1512a550b392d6f4d89cabda640cde375dd373d04f310c397309af3759799883bac8ffb952a0216b778c9c0252ba4b3f72cb84e30e9eb67a6628a9e8373de4896ca046e0c45a2e23b270dd69307969484705c3704a56f5570aae23c4fa349465b963cea3b2ed7131a22a055ac0fb7974cd545b33957ef43bd5dfa4f2b97c0e5ed7ddabdbd5246e06c03c4badc7729daf9521ca10ce0f8d9d"}]}, @nested={0x355, 0x62, 0x0, 0x1, [@typed={0xa1, 0x11, 0x0, 0x0, @binary="278b2c2199f3c0e23b4a0ee5b9bd9145da8e8e6f74594b4aff6e1dd9cdb106bfeeaba7f50bacd6f7459b2cb90905dcb7e40fe042f1f0c3b809301e097339b5484dd25e88117b57caf071fcb8e5a60e31d2911f217373c272396fb34c6af012126cddbe65159c6d92faad384c917d1d2683c662eee35b4a47268fc257338b19919d16e5e2d5d25347b9b91e556dcf4d23a0bb66908c31f42a73b6cc6e4c"}, @generic="2fa5f014cc1640f241f7e3ec7b31206cc66879940f74ecb94153b6c89cde8a7a08673053b4acd9c16ae74e3145e14ad1136304df318675978fdd3c5aa25ffae15536dc167c6de65e6c1c5815332d4bad2927e14dd3e9a8c695f8dcf94f424d8a4a34113d2adcad4ff55d39834e93d000250027b412157aa657b97107eb401cc34f7ae0b14944012d2eebf6a3a976e7813654f8602fcd8d7932e6694f6d42e31724e2c33553e55c9f5fa9b6dc473ad74b27c66e352ec8dfffa2ac72b68f1825f11dfa4046e82d94fb5a58d2167d5df1040bac51eb353c645a88960c37d6f0cdd54d7d", @generic="b8334caae3537a64c54dc7e050cfbf9e18c02a9a0be9042497ad7b0f9575e34d6489c872bfff32d1c2f0e58d0a09fdf304741365114715f8b5a52a1bfec1f22c932fb5b9faa556e9085617170ab9eb9ff41ea4454ef5ede7c048727bfb9b42c4bbf216de6fa29788c6126bbebe675680c4b5ec21dc67ae0b8a38f9d0ed2115e139a30b9539ab", @typed={0x13, 0x73, 0x0, 0x0, @str=')system\xa5vmnet1\x00'}, @generic="76f100580efd42534ef9da23f83fb9063147fff49bda7b0a73e019b1008c7f8a8dae00c00ac81842a95bf069c550ba5403d366f9e51a86517179d6c5b95f3db7911ea7946676468b45564a6dc80c5f92042904e60fb7824830d0681d638d73c41ce6d010c63e414638b7d63cbfe3989bc73724d6d85ba899af0f147810411a1bd6b6b7ceef8258e71cbd17d53262d1119eae8056fa", @generic="f8a13dc0a5e22e6d98bf18930d77490819bc5686e9441436f4ffed38ecea5d01a558127412159b198da326d9ffacf0c5b67a8760627e6a70afd1a94111afd3346cc0b7f6e305c9e2df2bf7ff614a82318acef3e45f4b0148a8f4fbeddec0f9a9b9906114e9f85a3899c25b7b14aaf8eb2a38097d358e8c31f471d2558feb14bfc1355746405054ed337cf4291c7d274ff31ca6afaadc85cfccda394a"]}, @nested={0xd8, 0x12, 0x0, 0x1, [@generic="d38cfa0ccf9967eb1f2d7f2a6729f8ade1f70e472790d047847859beaf0808ecab3b3b0818b216be499a03cddde00700fdf5f38a73942c945636e676bfe0d69f824c9c4791d6628e0fb72582f7a933fba8d4c92fc94014b1b8722e04784e6f90b38c034b16add85cfbc556b21a055e669465109ba5d0c14c0800693cbe79fc42c7ce89bba9fc196583ac80fb19c0b13a1e366e748f3d2a3f43fa2061b13c32a0b6374b1bacc638e0d41c072b1ac198855513fd233caec5ba84acdf04a2ea50fe0b12f898ac989ed735a762dfe542f8e135d677af"]}]}, 0x1674}, {&(0x7f0000001800)={0x1380, 0x1b, 0x800, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x123a, 0x1c, 0x0, 0x1, [@generic="bbe2c859550fb9b74c92508479a4b3b0920a544471600ec0dd1af806f0f5519a7689aa6a7cb712c4e0", @typed={0x4, 0x28}, @typed={0x8, 0x92, 0x0, 0x0, @u32=0x5}, @generic="b33d986867239802503854c916623988c7db8f0e4a0fbb0e975f1f817e8d967d787376c3438694477e40795f53ca7637eb2e775aa451e2dd879789c8e402d886b020199f293155580c2edd94ed9a17f07768090eb8c75cacfa4115765cf1734febb2f7b061c3b7a46775a17afe3698b380b019638a472b566b1b406df0f43a97ea3e36f8fc559a51f1b04c47bdfef873e51fba34836774a3372e7db0665748d5e6a148ee40e82bae553b6d057eec8ade8b6f6ad70f986f1ed87b7b8787e99d4ee54a9f", @generic="94e24c44dd424e6af1510eedcb98239d9fdacb13d17a00ed3fb54fed4e95dc09105cabe0f1abcc0cfff85d4332fdc43d0506a839df1b27ad522444c952b624c34dec759c03c41c5ba8b39786c9927536bdffee7066d3f47e8b3136a9d29e5572a08b551bd778402e959f6923afb2cb5c38aa05c8db7d2d30aa7d37e9246ae518e60e72decd6f3fa4e2af25336cb5e7bb08b7e71be50216e4444aec1f3cd23d8107705db3b4437bd540e2df9e3efafc77708f01633bf82c193bf61a15162afe3017eca3741baaaaaf6d37d9b20cbfb3a552b4b6745dcc43d6bfa9ae045529a812a59ee37b289d1217937a769cd89409edae648f2957743199ae2263e08368fa4c4734d85c285b8b2ad4ee4df15d97c9368132b981eb402233acea3343c44348105946f719fbbe52260237bc2c7e638c1d9d95d3cd5a1453ca6c7764d309483b57478e9dd075c770cd9da1d6959342a14d7f30b4cef1127ed4a73a031cff6e4626c9c75433e2c7e1b45ba62a3c9ac7f0efe82936c0978f8a050fe5a84b6ac568dee9cada76120201859a3985f8f1e275b236d72b70fb540f0a6795ecbe9cd4d97fbe58f03be5fc65506d0b267c2d87e2f9909ed07c3532d11153b8565661828090beefd07ac28ec2a3502725916fba7ce00e9e842c3cffac83361d57f25235f109fe5ee294084a665ac73612b7120ef005be9fe0f8f1858f85667e2d6d4d3957c19216d930a356abc94d2fd37c430daf26a2b34f19c9184fc6c1be2c83e959ed638872e305c8a83f1ba69209ed7848aabcb4917575ca61159afce9d8041abf4bb8ccf2d040d3d901dda8f7e7cfaa18e1aa75200a1958fdb00e1c82ec76c61d2b3530cb7492113f7d7025b628cfb5230be60094db25ade2b42169aa9379d176d1014c940a276b639b8afd6c28da482e036ee59203b99139af53a9de03d8af15a5c39fab732e3517b0b7bdfe1cb651110a967facc9570ed97af182a4b5f81a82fa8284e6b9a7f4756167b1bddb05082ddfb83bc4b7abf8f0be6c21871049fb55d362ef807d529b7ba38e325b51c4a839f0f9c1e57ac8971f2faba4b3554f8a5090f8751c53943c6c5bcf67461d6c6749b1c85093791528d070e7bf6844e9a6423ec61345276ac374c8bcfd9a7138439dff3f173fe740d20b7ffec455975e17215a4f5b970d9e13dd79a9147386b19824adfa1c5b1c28b50472af000cd76a37a56429df4e7c3275e32784fc6973490d8f54ad68ea4c60d23373295a58faed12fd33652df8aed7e40009b75825d712dc5e946e961f62643cbf2e07016140322384864bfd8363788002074df58074961b506324f353796540b3eb58f2c11b1c249737d45ed3dfab1ef08dd697ace04fc00b72e2acbaa651377f7b704c5a0845cb710bc883153bc9adf97558a6a680012c7108093a1af078a7aa860a241e1aed9882b8ae52b1205fc5fc6f9db6cb2f82d76c492096459988c70d7eae88be9c7eefe8da70b7210e3ca3ea73c00ee5f9b4a422234c659771646a6ff7feda558dc36d35a6fd9efad3f08b39654635d70caa6d082619ef3c90fe23a262e02842e0d3ebf0e53f11f68bc07f60cec0dfd3881b78e7cc07dc2e67464bc4aae84328ed5da3fbf2dd1f4cef1508114e1abc64467235bdbae8f7a26d7939fa9a05a03129f1d228166061665f353d3e9cd7ffe831ea4a052efc6b089dbb75311123d0e1f63ab3478693f068e68ba4bd23110e1a91d040307e38683af98d8ed211f6812b26b2c6910cbe77b6e212b5d30a78dd75355074cee0f15a86cfcd035d4d1f37a97f2f17d134a7b5ae4825905762440941d46bffa319385b1b082f383feef1416cc34a05d1efce0650ed8efe2875306c63c4a5abcea015356ecc062d615794481e2ff509778513cce3ea0ddf0efe295a2c1a36fc5e2f67e218c36b0fbbe40af98a2696fafd009c3643d0cc6a7f72ca2646ae481d9cb936d38b0bb390ef478e2823bd2f5eb6aedf4c04992aba1381a883b46131faa23b0a1c078cc2208710136f53c35e93900d157f04408156b2a3af7826e2c2167f2332bb7d8e143ab0ee9de3d6536890ae2f0d4ae83b129f9db60e8d432b04c908f4ee7d3cc8b8be18e77e690907a4cd7495ab311612dd8d978a6a1b583e02105a00a2ded91a1fd1e3db0bda1da759d5fa1add75bdff4fd00aaa429fab3f9a807af628fb2e1389d87caf5405245ef9033677780c3bc7261fc516869e22bb845577b49b89ada2250d7999c18a74a98f16b797242a71387900a2bafd3bc81f5b661281c02dbc5b91b8661923477419b3b8b50d8119037788677e599ad5280dfe03441d97e2cfcc98dae92efa88c3c49d30f70d7057e1c8ae9e04af557322d7615181031376be68039ab1125cfe1177ce66a1a0d904f0f718fb86cd45ea7bfd3066baaafc510f026424b893ccf159faceb3fcbf3428463e0d750870cd706bf2cb505cb60c3cb22e86d74986f9367ba1ceffbce5143b6d51d0ca0d32a3e2b07c3d61875c8c4e9f8f4bd7289d2b9b454a102b27bb61083d0e585d6ebadaf40b08f15e03f685e512797581e12e7b2496e5f3e1060ee690e1bab847fc8dbe6f97f49e29816fe0b305c955f930bc97b1c5d4811561362b516bc057f818f27636c0c51d5ef6a9f2aafa3e3bd74dc2f1a7bbf8372c9bb9366f76e2ece91baa22651cdf1857d1ed699d2132afc855709a07997312cff31224e7cf5dcac04f199a5e4c68706cd10c43df23e8f510f599f774a217e1d9d794cff660cc481199da6c881947742d960983f1c75b06d4df91c7cf1112f82d6656e03f22dc6de39683b912a0a1176b6c3292c034facffdbd9799f12e9a5081fe3b0310d5dce99a59f109ae97ad9b703bc6021bc82f7258da21a1f7a50e10cd6e9ddb918e20e5fe7bd716527e0861904f5976df975249084b0b9db1477498a08e11406d2025181237efbcbe4f9baefbd5f58b22599a79d12f7af6c7763bc212be2da0f6c5e357ed849ad7f0f0c8e4dc160314046c8a923ad423cd93dd199a1778d41eb0aa490e46828f629ce65578b122c3b5658300ba68996fb047c315e34fcf4af9a565485275dfdc0fbcc21dc88a838e9cd289f56b445a11a40e07dc7e2703f537b4189de897caf2d4c094fd7ef45a97c28c52f284ae2bbd22e1a2ccff293b1822866950c3852d7a67f0dd0f163c4bfd38b00cbab75611910c7cd73dd20e78dd8a7388e298d3ac130abcc88fecd28412b2c179d9779aacb6f01b2666143c1114caf212e02af9261f0c1df5d574ca786befeb93f2449e9148c96f4c4cbb5d4f8382bd1da5c75279187c09a312c4f5569a4df29ca7fc6198312637601d9b6ae1ea30f9742a648603d35ca744b49c4a6e4b7b408611bb7f8aaf361d3a00f30b97780c5213c4e700f5ae18d99bcf789e0dfdba30291fcbf075fdb3f881da377ec00954971f3b48b7f557de473c623e64bfaffdff6eba428331768dd49144332ac0afe00793e1ee8337d04764d4243a75d0f6a031f253753559bb9a8fb8cb2a1aae9106396e3edc9f584d223fc1bb24d116a5b544b8181919f6c8810063efdf094f70e5080ed77b0770abef58e547a9a31bbbbcae5b7df28d6ca487add4aa68c4665408138ec1ea1075193f09629a94aa459406924d18b40a8aedee1d30ed02da2058ab12c801d6db224a5b691163b7288fe144b6b8eda285e91309aaa4f494c33159ab23cf85415653a2dfbee5fb8ed631e305f829e7823ea7a4ca02b554810be84adc09606c0f3757a001b4259b9042650e57a4a45dcd330c935f604e346f06b04e6bda56413202e031bc029330d50d744c2cad31980d7731ec1f5582ff74fd9160a6c2e2c5a8c61e09677d9c76204a2ed5b44d92251bc2a70563257e6e3cb249eea64a7b019af7c5bc5880e5317d4ddd63f7893929a6750f0895e554a40bf31b104a1b8c0b8ef8f50585431e2c7a6398eb426ffd791bd51814baf634646fad99536fd44b4315bc8041641baa529ec35c29e05b06126f16ce98fbe1d662c3d0c2681a6fe3109ee284f1ddcc2d462a4ed85809b7cd8057e76c2ec732a7e37230051a55cc9950c04f98f4cfd23a90c619d5e31b24fc4720ee0c44bd0525f9389febfcd517d954e0a95db3c2bfd7291ef976d73670fca50ba08020104d01e1f9e0c6e8cb754a6caf464c899c03731329c6a0fe41088253a3ca3306691c202e9bb7f7a445a0d7951f104a8e9363091f49e3490ca02dd39e4432765426a27e9082b8c23b27c7127a261170bfdffff5f60d4ab0031fd06946f10ff478b4d95b1cb03d5632fa17c581e09bcdee50d1479308cba3180fb8d5ce8ec06e82da168852563b1278f3d550ebfd53a660798e1b6fd93fa439846228c1796f781ad11de7d46d4c5563624f99e2b2c863f0d7bc9dfa33da7578acd388fc2a94aa05f241bc0c507abebe60178e4988c7935b87ac7a51878eecc2c8b1498cde2cf31fa1a37da3552c6dddf6a9e5e75896084b4d20a0b9a37e33f18f23308e5e6a964cd1f2adda043e5221e9ff71d3802debdb8a22b1b90a89c20a9f8462edf19959563440f707d65a204b21118dc4a9f76d13c44e17ae05cd9afc9d6e875ad4c7b5159048b78b2a312e26160199e2d59cd377094c3e0fd3e7c619dfcc24dfad33a4d0202e3365fdbd991cde75129b49d241b07b480a3029248982df2bafd2f91188ec44d3d0bc919a2b49dbf27e7d95acc9d600778ca99c8510c6c685fb6cada4590a86f7fd5822232e4b830064c3b83e2bd09bb64e64214ab04ced9b794057c2d1f9d62c60a9ee4feabf9338de16f41f9a2f49106d366fe965012d5d90aa1fa1dc4e52bc10e9fe20e15c9714f55f495f6e583b4bf61c66b1564e39fdbc54fd262f032d2382638965e64e617234cf70e25c7418ff39d728dd965bd9b77fc9bbec5cb30e310524e90fa317d738d4233d898d28296ed1bd21ab3e3b6f1e59aeb3b63b2b19e947504ef0c9701476c26703327b77d46772d585a109649613a6a58355bce4c50b2e37ef9ad0928f2a38d426f9bc40d393415d2b9ebcdb2461c8b5667dd8aacd9c77a6e821c8cf22b7c1cfe3449f1b504ef21aa0daa7cc77ae90c3b00b00ef787f080f615ec0378ed8ff227d1d6438097bee0ba2d3274e1bed4756d2adb7e0aaf6d3ffa1787cab63b31d59dc24b021cb1ec069749168f97869076cd663a27546d263c471826159d77e488dfdc50155dc6e2bea29a35966bec0d56ecec1793f7622206369bc14b89ed3df6e1d611607c0cb1eb63dfede9322e96e5e631be84eb5d50b8a51e79bf673670007914e48e36088828db2d5d26bc920c5b35031a92fcca61126ea8f8935e45505b144bb01884bb9a3ebcf82e25894450421d29a7e4c6a82427614d8c3f36308e627d36f31460677c438c0b1a46f16f218296e8050f081ca9b17b84beaddedb22572acd4909df9e54a7d73831d663daa1295969859306308d91d4cce01becd1191655f84830a3cb68edbf72878a004b3b8ad5521ee84663de0ebc83cef05c32d899028135d3228b527fd232bfa5cd61386176b6411f4f49cda52049fdb43ebf6e69d19a039a2ecd37bff49824928dfd2eaf63257cf884ddac64d0e57eedd6623838dadf99214f5c58742ae1908015417133730ee5aed3320740c0627be71cc0000637dfd4b325f230b7b73b7e8c95403111fa86e9c9a9f717181ae9331697fbe7f0e12be8ae57bc2c378d740dec232a1aa03d773bf2facce1c2d51b5d143cbc81475042e0f974ca4596b54aa339caae3d2a1132f233f780c9bad4763c97ca8", @typed={0x8, 0xb, 0x0, 0x0, @u32=0x80000001}, @generic="e8ffa9874135996d3cf332dc001216c712102e98d5dd5fbf553397d274b615bb1c6849156aed7d76", @typed={0xc, 0x65, 0x0, 0x0, @u64=0x6}, @typed={0x8, 0x73, 0x0, 0x0, @ipv4=@empty}, @generic="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"]}, @typed={0x14, 0x71, 0x0, 0x0, @binary="1a1dcf923b5238c7262e7902b53be369"}, @generic="396484e2191b2d24cc67b0d1d905d6a9be8bb98c4b8a021cf716e427aea5103b6a37533ea169989702f132c6e854b5879b7e3a89dc546dd504c1e6468e8879b20d2dc171877700c25f6580c231fe47fdf0923193c467b4321153ce1869f312e56013ade1d94761a0f3c6", @nested={0x18, 0x61, 0x0, 0x1, [@typed={0x8, 0x8e, 0x0, 0x0, @pid=r6}, @typed={0xb, 0x20, 0x0, 0x0, @str='\\nodev\x00'}]}, @generic="383e1c25cdd5ae95b42a95eb4486621b9f2d9610002c7f3d23b0aef33e57d9a98acc43acd96157676614473077219af6d8fc9ca862be6c8745ae4f25cca1240816e026539d238eeaa2e665dd616907b7c97c4bf3c0f98d74d88e44c53bb4185d5c5dfd3631c132ce67e9debf240eaed59a0fecde12cc857784beb60b90ac72036dcea63d09a54fd1770d718d3d30222b45b3d6", @typed={0x8, 0x48, 0x0, 0x0, @fd=r0}]}, 0x1380}, {&(0x7f0000002b80)={0x1d4, 0x15, 0x300, 0x70bd28, 0x25dfdbfb, "", [@typed={0x14, 0x77, 0x0, 0x0, @ipv6=@local}, @typed={0x8, 0x4d, 0x0, 0x0, @uid=r1}, @generic="f8cd6cbda5896192c6f0fff8e35b5d1582ae1effb05e3cc31852d9fea28eee21e600e3", @generic="abd41d094511f17df31eed2cd8d95b8ac041df3ba1bdae686bf4a6b6dfa2c2b1f3e9cb58d705bbea60e7987026ffe4195bab942e064e7d808e7f9329d012519bdc36e05cd83fed4a81b9b7672af5cb6628928e9089ea28a003ca3416e02db56bdb8bcb785f2d3154e592e3263d90d53966ef8dfec4186e5579a113636591b0656b701377823985343c0c9d07", @generic="32f631b97c6c32959a9ae264cfed782bfa37e84cb801fb9d79072d2bc653f5f4a1bcdcbc153c4ba8d39fc53b6286d6d95d0683f5d46ace44a13d81808a1e58d65d0f143cb447fa77ea8081df65b5a517fce7cfbbc3965ec503a1fc11ff28491d5a2196cacfca2ca8a6197ff513eabd2a8e5b856cfa9e97886814e9cb650dbdf2052c94f142911a268c11660f9d5f3b2bb1be3176df3e2a5ad7cd69794a2154bc2da606fa3171899eb4d46eccac90b593937df1330df5f7a81aa4f317254785daa95dccca199bf565bb20304e6c91bfe010ed8bae2dbd20fb28cc830858c78f21f3c2b4345545a3d90bb53cf94a3a85c04d5b00e565fb"]}, 0x1d4}, {&(0x7f0000002d80)={0x25c, 0x15, 0x200, 0x70bd2d, 0x25dfdbfb, "", [@typed={0x14, 0x43, 0x0, 0x0, @ipv6=@mcast1}, @typed={0xb3, 0x75, 0x0, 0x0, @binary="32b418b06ab25724282abaa0253cbf213ce16a0a788763a3110c4e478c53f79790e6138d323f81671d2073e09afa62f8006855406b92c36bc738c59b1ae5fee431217db5a0859a89161e6485cdbf02b682aec06ea6d9ea46616e145b53106c46dc6062d49078c2bc3a46d8c7fd190d7e1043e31e115dee72d1199bfac536e608c7dd1ebf6cf6fa2955e5fbc9561debab4013cf5695430d0b9885963c8af3fbd8d611857e7bd50f2a8d7258d90d5c26"}, @typed={0x14, 0x59, 0x0, 0x0, @ipv6=@remote}, @nested={0x27, 0x72, 0x0, 0x1, [@generic="9e1bf8ef2fecb478e14f50a70ffa6b645092b3e7ec516945f40fdc0f322135", @typed={0x4, 0x80}]}, @generic="7ac7a5d7475317621d5f3923856b1b073e697670927da35cb488a250d1a14dda1eef0a9d2845485ae49477438ec2dc4547afacb4fcb8ba56446ae8db24fba03e8d2493bf09403ff2c6e038f3d8d3de5a71b5c1e631e9be29c13045d890e0b543637b44b88a02ab95dbde2fc41c3970761144c0bd3324c659a662ceb2960c2bb2d9d5f44d38d5ba980cc55f2f2521ffb4893cc027d1fbff7abf6a07a8d6cf6e54c38fe2a593009a7f07f001b9cadc3e1970bd672a501983bee9aabc62719e08d3c8ac0579464356d096bd5a3cb8b7e71bd8bf7f95f9b462a8c0fa3dd5dcb21b0c2cfc24e45d93864368cc567f450eae5e7e", @nested={0x54, 0x12, 0x0, 0x1, [@typed={0x4d, 0x3d, 0x0, 0x0, @binary="24ac282105c68b0760ce26d00c49b05309545c689abee3d2c71beda464d731639189850d9b58074ea8dd534847b32a4c9c13512481026ce55dda2ecaa864da524ce3ad81c81a198aa9"}]}]}, 0x25c}, {&(0x7f0000003000)={0x33ec, 0x18, 0x1, 0x70bd2a, 0x25dfdbfd, "", [@generic="e8d375bfaa30c7a2b692acdedda7046054095bcf1bec4d97459c40bb85fd70d57e0aa99151a3d79f3a24c5d6463581cd3ac2208a57963d15", @typed={0x4, 0x54}, @nested={0x1004, 0x49, 0x0, 0x1, [@generic="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"]}, @typed={0x14, 0x82, 0x0, 0x0, @ipv6=@local}, @nested={0xce, 0x3f, 0x0, 0x1, [@typed={0x8, 0x7f, 0x0, 0x0, @ipv4=@rand_addr=0x9}, @generic="0f1925ee651b318a4398b09b6ee51f72a72e480e707e6e53def31f5f8c205fb964d418694269c492144c045f72dd8e59", @generic="491cfe5bf079bf6538221159ef7656701a48a903980890a022546dae9a7366b9a692c6b3d773d740f1258b9556b99cba7b117e9b58de7f25feca678d53e57fad65fa3c1578ec8b54d60b14fbffe7a20b9433d1fbbb4aab2c3d06da343980e65f8d25face8548a47d4b27ab289629dc443fa3dd95c14861914aed9a9247951a1733a09e2f111a", @typed={0x4, 0x6c}, @typed={0x8, 0x81, 0x0, 0x0, @ipv4=@local}]}, @generic="c04f8fa84390dd68f5647feba2a955de1404e5df1da4c6f083ce940f6505b40936a1385b233c6704182a8d25db256386faaf731314323a57a5b7bc9f5ac3d019a0e9f0491f47adfce5648c13e9a9e463076767ceec7ed1cc6e419ac5b6e2380aed19f3be1ad9c603d7bb20d9679ea77e0da7d60680f09d7d9a2c", @nested={0x2123, 0x28, 0x0, 0x1, [@generic="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", @generic="1a0c2370b453754a285b53b2c91d9dbc098df5660c32efa3de6356e5d0db027328dc6aad1e3212ac09d57269af0d037f0a12f751f7c2973085dbb370fd27f9f29ca659a38892c2f9c4f8d758a97fa1736042d28c9a1dd03c9081269cf0b2d9634abb9d6d888dface4e115f65b86a5cb1a107f4047dcd711a66070dfe780bad4410b789fadeda113a2ee2769494d0", @generic="444d6f57795b7bcf47fd4c29be724888bed5f5856a939660981ae54a7bc107a6035625aaeb5847961b2d3a2da9f02295befbec2fc378f75010d89337bd8dd683307f30f4f4e7a0b6f37b2b23d66f8633129ef03a2f399d177197a1abcd0ed1456c6c7de832c3736c6ad817e62fdbecee219ae340664fca6db775347c09fd81a5550df83f8265ec9dffb17a663be82065f4", @generic="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"]}, @generic="b5b8b1f5d782cadaa973c01762514dce069845f06df1fdf31f9b51659ac7dd4006cf17b6824061199a58b1daf1371f1fbd99954501e90f7f543d57c2622142f1d726b98b13b9c3f3fec7a9717b47aac697f193b7ff1b9f80b356c5c0523014f3ef08ca1a6d95d0777d015eef62dc0a624d", @nested={0xa5, 0x7a, 0x0, 0x1, [@typed={0x8, 0x4d, 0x0, 0x0, @ipv4=@local}, @generic="3c1dc21f4ad3b830cfaf87a8cdb248ef8744afdd6551a8a7ee866d887976aef757050d5f7c2c3b0a5baade34789ca41000de8983f0bf5e1f453d238e8f603b2f772005ad7d55f6bb56c6ce23132beacce0cc38bedd8a9bf29cc16a2ad20dafe14e4d0b2cdbf8b206e148d4f56d8c7b95478286c1c96de4b5eb99161fee898d5ecb32d08f66b218adee0537dcc4bef22c37022f66b14fca0cbb"]}]}, 0x33ec}, {&(0x7f0000006400)={0x1c, 0x26, 0x200, 0x70bd26, 0x25dfdbfd, "", [@typed={0xc, 0x81, 0x0, 0x0, @u64=0x5}]}, 0x1c}], 0x6, &(0x7f0000006500)=[@rights={{0x18, 0x1, 0x1, [r7, r8]}}, @cred={{0x1c, 0x1, 0x2, {r9, r11, r2}}}], 0x38, 0x44000}, 0x811) setresgid(0x0, r2, 0x0) r12 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8040, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r12, 0x0, 0x3, &(0x7f00000000c0)=0x2, 0x4) 16:45:08 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5607, 0x0) 16:45:08 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x1000000, 0x6c5}) 16:45:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x80000, 0x0) connect$l2tp6(r2, &(0x7f00000001c0)={0xa, 0x0, 0xffffff38, @mcast2, 0x3, 0x1}, 0x20) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x400080, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r5, 0x28, 0x1, &(0x7f0000000300)=0x4, 0x8) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$l2tp6(r6, &(0x7f0000000200)="542288965cac45acd61c83b976f4ab7146f3b416e6a3ebb8766c272ed45f9e75bad3404131f954b27d20fc9eb9c86946fe9d5207d26c2a03f156b29750b143733a6dc865e19ae37836e2e4d7a75512cba178d0bcf5f78e929fe0ae80cebbdc98eb5d53a4abdf3cee5e1f540c70f41a59f51f365a7b15d9d7fea52c83e5662b2f72f61c4b8d393b0e2d378a40007d25f26dbf448857cdda5c1ae5d643c99d4fc9637d3c7ceafb4f3c6e9458678de8f564f43018944cb44293e86c3d18d0d55f2a55485954cbfc726e1fee8f594931f8ba9b57640fdc3c7bd334000d787c09e1cc9f9ec1a2f0f680a8f2f9b3e9", 0xec, 0x40, 0x0, 0x0) getdents(r3, &(0x7f00000000c0)=""/187, 0xbb) setresgid(0x0, r1, 0x0) 16:45:08 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560f, 0x0) 16:45:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4fa}, 0x28) [ 1876.315235] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:45:09 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x2ff}) 16:45:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDGKBSENT(r0, 0x5608, 0x0) 16:45:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff80000ff79a4f0ff00000000b7060000efffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b70000000000000095000000000000006f8830bf511507964b79f7acf091839ec5300a584fe44c80de0b181417e9adb31b0e536cc3d2f2518ae3961a29ea15fa7e22f0f3e51416b698f6da6fe8af496d22585ffab3af24974fae7b28e6902c04006cc6983945dd5963f79f6799f0f0af9f42df3588c012df45855e54c1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x2000a0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9b0186dd", 0x0, 0x4fb}, 0x28) 16:45:09 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x20, r3, 0x70f, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}, 0x1, 0x74000000}, 0x0) 16:45:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x560f, &(0x7f0000000000)) 16:45:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r3 = syz_open_procfs(r1, &(0x7f0000000080)='net/tcp6\x00') getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) setresgid(0x0, r2, 0x0) [ 1876.662062] ================================================================== [ 1876.662106] BUG: KASAN: use-after-free in con_shutdown+0x85/0x90 [ 1876.662119] Write of size 8 at addr ffff88809c13e3c8 by task syz-executor.1/20324 [ 1876.662122] [ 1876.662139] CPU: 0 PID: 20324 Comm: syz-executor.1 Not tainted 4.19.102-syzkaller #0 [ 1876.662147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1876.662151] Call Trace: [ 1876.662170] dump_stack+0x197/0x210 [ 1876.662189] ? con_shutdown+0x85/0x90 [ 1876.662208] print_address_description.cold+0x7c/0x20d [ 1876.662227] ? con_shutdown+0x85/0x90 [ 1876.662243] kasan_report.cold+0x8c/0x2ba [ 1876.662260] ? set_palette+0x1c0/0x1c0 [ 1876.662280] __asan_report_store8_noabort+0x17/0x20 [ 1876.662295] con_shutdown+0x85/0x90 [ 1876.662312] release_tty+0xe4/0x4d0 [ 1876.662332] tty_release_struct+0x3c/0x50 [ 1876.662350] tty_release+0xbcb/0xe90 [ 1876.662375] ? tty_release_struct+0x50/0x50 [ 1876.662401] __fput+0x2dd/0x8b0 [ 1876.662428] ____fput+0x16/0x20 [ 1876.662445] task_work_run+0x145/0x1c0 [ 1876.662471] exit_to_usermode_loop+0x273/0x2c0 [ 1876.662493] do_syscall_64+0x53d/0x620 [ 1876.662516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1876.662528] RIP: 0033:0x414f31 [ 1876.662544] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1876.662552] RSP: 002b:00007fffacb1f400 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1876.662567] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000414f31 [ 1876.662576] RDX: 0000001b32e20000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1876.662586] RBP: 0000000000000001 R08: 00000000d92ad709 R09: 00000000d92ad70d [ 1876.662595] R10: 00007fffacb1f4e0 R11: 0000000000000293 R12: 000000000075bf20 [ 1876.662603] R13: 00000000001ca262 R14: 0000000000760130 R15: 000000000075bf2c [ 1876.662624] [ 1876.662631] Allocated by task 20421: [ 1876.662646] save_stack+0x45/0xd0 [ 1876.662659] kasan_kmalloc+0xce/0xf0 [ 1876.662672] kmem_cache_alloc_trace+0x152/0x760 [ 1876.662685] vc_allocate+0x1f5/0x760 [ 1876.662699] con_install+0x52/0x410 [ 1876.662713] tty_init_dev+0xf7/0x460 [ 1876.662725] tty_open+0x4bf/0xb70 [ 1876.662738] chrdev_open+0x245/0x6b0 [ 1876.662750] do_dentry_open+0x4c3/0x1210 [ 1876.662761] vfs_open+0xa0/0xd0 [ 1876.662777] path_openat+0x10d8/0x44a0 [ 1876.662788] do_filp_open+0x1a1/0x280 [ 1876.662800] do_sys_open+0x3fe/0x550 [ 1876.662811] __x64_sys_open+0x7e/0xc0 [ 1876.662826] do_syscall_64+0xfd/0x620 [ 1876.662841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1876.662845] [ 1876.662851] Freed by task 20347: [ 1876.662864] save_stack+0x45/0xd0 [ 1876.662877] __kasan_slab_free+0x102/0x150 [ 1876.662891] kasan_slab_free+0xe/0x10 [ 1876.662902] kfree+0xcf/0x220 [ 1876.662917] vt_disallocate_all+0x2bd/0x3e0 [ 1876.662931] vt_ioctl+0xc38/0x2530 [ 1876.662943] tty_ioctl+0x7f3/0x1510 [ 1876.662955] do_vfs_ioctl+0xd5f/0x1380 [ 1876.662966] ksys_ioctl+0xab/0xd0 [ 1876.662979] __x64_sys_ioctl+0x73/0xb0 [ 1876.662993] do_syscall_64+0xfd/0x620 [ 1876.663008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1876.663012] [ 1876.663024] The buggy address belongs to the object at ffff88809c13e2c0 [ 1876.663024] which belongs to the cache kmalloc-2048 of size 2048 [ 1876.663036] The buggy address is located 264 bytes inside of [ 1876.663036] 2048-byte region [ffff88809c13e2c0, ffff88809c13eac0) [ 1876.663041] The buggy address belongs to the page: [ 1876.663055] page:ffffea0002704f80 count:1 mapcount:0 mapping:ffff88812c31cc40 index:0xffff88809c13f3c0 compound_mapcount: 0 [ 1876.663070] flags: 0xfffe0000008100(slab|head) [ 1876.663090] raw: 00fffe0000008100 ffffea00017cc008 ffffea00015c1308 ffff88812c31cc40 [ 1876.663107] raw: ffff88809c13f3c0 ffff88809c13e2c0 0000000100000002 0000000000000000 [ 1876.663113] page dumped because: kasan: bad access detected [ 1876.663117] [ 1876.663122] Memory state around the buggy address: [ 1876.663135] ffff88809c13e280: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 1876.663147] ffff88809c13e300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1876.663159] >ffff88809c13e380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1876.663165] ^ [ 1876.663176] ffff88809c13e400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1876.663188] ffff88809c13e480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1876.663194] ================================================================== [ 1876.663199] Disabling lock debugging due to kernel taint [ 1876.664891] Kernel panic - not syncing: panic_on_warn set ... [ 1876.664891] [ 1876.664910] CPU: 0 PID: 20324 Comm: syz-executor.1 Tainted: G B 4.19.102-syzkaller #0 [ 1876.664918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1876.664922] Call Trace: [ 1876.664942] dump_stack+0x197/0x210 [ 1876.664957] ? con_shutdown+0x85/0x90 [ 1876.665055] panic+0x26a/0x50e [ 1876.665075] ? __warn_printk+0xf3/0xf3 [ 1876.665098] ? con_shutdown+0x85/0x90 [ 1876.665111] ? preempt_schedule+0x4b/0x60 [ 1876.665127] ? ___preempt_schedule+0x16/0x18 [ 1876.665143] ? trace_hardirqs_on+0x5e/0x220 [ 1876.665161] ? con_shutdown+0x85/0x90 [ 1876.665177] kasan_end_report+0x47/0x4f [ 1876.665194] kasan_report.cold+0xa9/0x2ba [ 1876.665209] ? set_palette+0x1c0/0x1c0 [ 1876.665228] __asan_report_store8_noabort+0x17/0x20 [ 1876.665241] con_shutdown+0x85/0x90 [ 1876.665255] release_tty+0xe4/0x4d0 [ 1876.665271] tty_release_struct+0x3c/0x50 [ 1876.665286] tty_release+0xbcb/0xe90 [ 1876.665306] ? tty_release_struct+0x50/0x50 [ 1876.665322] __fput+0x2dd/0x8b0 [ 1876.665342] ____fput+0x16/0x20 [ 1876.665356] task_work_run+0x145/0x1c0 [ 1876.665377] exit_to_usermode_loop+0x273/0x2c0 [ 1876.665391] do_syscall_64+0x53d/0x620 [ 1876.665430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1876.665439] RIP: 0033:0x414f31 [ 1876.665454] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1876.665461] RSP: 002b:00007fffacb1f400 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1876.665474] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000414f31 [ 1876.665482] RDX: 0000001b32e20000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1876.665490] RBP: 0000000000000001 R08: 00000000d92ad709 R09: 00000000d92ad70d [ 1876.665499] R10: 00007fffacb1f4e0 R11: 0000000000000293 R12: 000000000075bf20 [ 1876.665507] R13: 00000000001ca262 R14: 0000000000760130 R15: 000000000075bf2c [ 1876.667207] Kernel Offset: disabled [ 1877.303129] Rebooting in 86400 seconds..