0c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb, 0x0, 0x0, 0xffffffffffffffff, 0x4]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0x541b, 0x0) 04:29:18 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000f00039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:29:18 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f00000000c0), 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x86802, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000080)) msgget(0x1, 0x180) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2) [ 2420.583527][ T752] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:18 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0xc0000) setsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000000100)={@dev={0xac, 0x14, 0x14, 0x1c}, @remote}, 0x8) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x800, 0x0) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000180)=0x400) r3 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0xfffffffffffff7fd, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000001c0)='vmnet0trustedmd5sum{\x00', r3}, 0x10) write$nbd(r3, &(0x7f0000000280)={0x67446698, 0x1, 0x0, 0x0, 0x1, "348a02c179644c1858a8a5539c65ce02ee62b183774425482ba51cb89cd2084994ac3b7bce3fef0cd29f34bb58227270bc124f4eb1c747404277e20fd1eea48d1580a1236867f039bd421dabe08077cbb9d13c1ce615fd014c5f3c59c411af19573b35dd4147f14189914ce6ce8c989d6c11a20e36438935f40c344bbda3b23b8956e02261eca15a324ca9793b20904a4100eebe7c"}, 0xa5) io_setup(0xcb0d, &(0x7f0000000340)=0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) io_pgetevents(r4, 0x2, 0x5, &(0x7f0000000380)=[{}, {}, {}, {}, {}], &(0x7f0000000480)={r5, r6+30000000}, &(0x7f0000000500)={&(0x7f00000004c0)={0x2}, 0x8}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) recvfrom$packet(r7, &(0x7f0000000580)=""/227, 0xe3, 0x10000, &(0x7f00000006c0)={0x11, 0x4, r8, 0x1, 0xe4}, 0x14) r9 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000700)={0x28, 0x0, 0x80000000, @host}, 0x10, 0x800) fgetxattr(r9, &(0x7f0000000740)=@known='system.advise\x00', &(0x7f0000000780)=""/71, 0x47) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000800)='/dev/snapshot\x00', 0x1010a0, 0x0) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0, 0x0}, &(0x7f00000008c0)=0xc) getresuid(&(0x7f0000000900)=0x0, &(0x7f0000000940)=0x0, &(0x7f0000000980)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r11, 0xc0286405, &(0x7f00000009c0)={0x1ff, 0xdd, r12, 0x0, r16, 0x0, 0x80000001, 0x20}) r18 = socket$inet6_udp(0xa, 0x2, 0x0) fchown(r18, r13, r14) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000004, 0x50, r10, 0x0) r19 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x42000, 0x0) r20 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000b40)=0xe8) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000d40)=0xe8) fstat(r0, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r9, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r27 = geteuid() getresgid(&(0x7f0000000f40), &(0x7f0000000f80)=0x0, &(0x7f0000000fc0)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001000)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000001100)=0xe8) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r19, &(0x7f0000001200)={0x5f8, 0x0, 0x5, [{{0x0, 0x1, 0xf884, 0xffffffff, 0x1, 0xa9, {0x0, 0x5, 0x100000001, 0x101, 0x80000000, 0x6, 0x20, 0x0, 0x5, 0x4, 0x8, r17, r20, 0x1, 0x101}}, {0x1, 0x2, 0x0, 0x20}}, {{0x5, 0x1, 0xce5, 0x9, 0xfffffff8, 0x8, {0x2, 0x9, 0x1ff, 0xffffffffffffffff, 0x2a2f, 0x2, 0x1ff, 0x6, 0x0, 0x9, 0x7, 0x0, r14, 0x6000000, 0x3}}, {0x4, 0xf99ab2f, 0x11, 0x100, '\'\\mime_type!%-&/{'}}, {{0x4, 0x2, 0xab, 0x7, 0x1521, 0x80000001, {0x2, 0x4, 0x101, 0x36ee, 0x0, 0x4, 0x6, 0x9, 0x10001, 0x7, 0x3ff, r21, r22, 0x5, 0x2}}, {0x3, 0x6, 0xe, 0x7fff, '/dev/snapshot\x00'}}, {{0x1, 0x1, 0x1, 0x2, 0x8, 0x9, {0x3, 0x6, 0x0, 0x20, 0x3, 0x1, 0x10000, 0x7, 0x1, 0x3, 0x8, r23, r24, 0x5, 0xa8a9}}, {0x5, 0x6, 0x17, 0x1000, 'cgroupvboxnet1systemGPL'}}, {{0x4, 0x2, 0x5, 0x6, 0x4, 0x3, {0x3, 0x1, 0x8, 0x40, 0x1ff, 0x7f, 0x7fffffff, 0x5, 0xfffffff9, 0x1ff, 0xae, r25, 0xee00, 0x1, 0xfff}}, {0x100, 0x4e, 0x12, 0x6, '/dev/snd/pcmC#D#p\x00'}}, {{0x2, 0x1, 0x8, 0x28, 0x5, 0x340, {0x2, 0x4, 0x2, 0x4, 0x80000001, 0x48ae, 0x4, 0x6, 0xd7, 0x4, 0x9, 0xffffffffffffffff, r26, 0x6, 0x2}}, {0x0, 0x7fff, 0x12, 0x1, '/mime_typemd5sum(\x00'}}, {{0x3, 0x3, 0x6, 0x1f, 0x8000, 0x3b, {0x0, 0x0, 0x401, 0x7, 0x5ac, 0x7, 0x10000, 0x0, 0x7, 0x8, 0xffffffff, r27, r28, 0x4, 0x79}}, {0x2, 0x1, 0x0, 0xcbaa}}, {{0x3, 0x2, 0xfffffffffffffffb, 0x8, 0x8, 0x3, {0x5, 0x6, 0x2, 0x9b27, 0xd7, 0x4, 0x51, 0x1ff, 0x6, 0x0, 0x7, r15, r14, 0x5, 0x2}}, {0x6, 0xe8, 0x10, 0x40, '/dev/sequencer2\x00'}}, {{0x6, 0x0, 0x75, 0x4, 0x9, 0x687e, {0x4, 0xb472, 0x4, 0x0, 0x0, 0xfffffffeffffffff, 0x5, 0x1000, 0x4a5, 0x9, 0x6, r29, r30, 0x7, 0x17e}}, {0x5, 0x80000000, 0xe, 0x5, '/dev/snapshot\x00'}}]}, 0x5f8) 04:29:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00\x87\xec\x80\xa4\xb5.\x17\'\x8c\x97\xcd]K\xd01@\xea\x82\xb4x\xe9\xceNC\xe4\xd6\xf1\x89\x8bIY\xbbE\xaf\xb9\x8a\x12e\x1c\xc7;\x00\xb2\xfc\xff\x03\xfb\x19\xb7\xf3\xf1\xf333\xed\x05#4\x98\xfc>_\x98\x7f\x86%\xf7\x8e\x8a\x13@\xd7\xd3#\x98\xec>\xae\x1e];\x10\xea\x93\xff\xb0\xfe\xd1\xcfU\xce\x17\xbb\xc7\x92h\x1cb\r}r\x03\f\xbe\x10Nzj\x15l\xe3\x17\xab\x8b\x8fnX\xb1DT\xa9\xf7\xfd\x17{R2P\xa55\x94R\x92;y\x8e\xe8', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0xc) recvmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/156, 0x9c}, {&(0x7f0000000480)=""/218, 0xda}, {&(0x7f0000000680)=""/150, 0x96}, {&(0x7f0000000080)=""/53, 0x35}], 0x4, &(0x7f0000000740)=""/207, 0xcf}, 0x6}, {{&(0x7f0000000300)=@xdp, 0x80, &(0x7f0000003b80)=[{&(0x7f0000000200)=""/30, 0x1e}, {&(0x7f0000000840)=""/226, 0xe2}, {&(0x7f0000000580)=""/62, 0x3e}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000001940)=""/117, 0x75}, {&(0x7f00000019c0)=""/154, 0x9a}, {&(0x7f0000000940)=""/82, 0x52}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/4105, 0x1009}, {&(0x7f0000003b00)=""/70, 0x46}], 0xa, &(0x7f00000005c0)=""/43, 0x2b}, 0x1af}, {{0x0, 0x0, &(0x7f0000003d40)=[{&(0x7f0000003c40)=""/217, 0xd9}], 0x1, &(0x7f0000003d80)=""/14, 0xe}, 0x34}, {{&(0x7f0000003dc0)=@nfc_llcp, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003e40)=""/183, 0xb7}], 0x1, &(0x7f0000003f40)=""/129, 0x81}, 0xcf}, {{&(0x7f0000004000)=@l2, 0x80, &(0x7f00000040c0)=[{&(0x7f0000004080)=""/21, 0x15}], 0x1, &(0x7f0000004100)=""/6, 0x6}, 0x7ff}, {{&(0x7f0000004140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000005580)=[{&(0x7f00000041c0)=""/4096, 0x1000}, {&(0x7f00000051c0)=""/59, 0x3b}, {&(0x7f0000005200)=""/213, 0xd5}, {&(0x7f0000005300)=""/135, 0x87}, {&(0x7f0000000b00)=""/91, 0x5b}, {&(0x7f0000005440)=""/63, 0x3f}, {&(0x7f0000005480)=""/230, 0xe6}], 0x7, &(0x7f0000005600)=""/216, 0xd8}, 0x100}], 0x6, 0x100, &(0x7f0000005880)={0x0, 0x989680}) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f00000058c0), &(0x7f0000005900)=0x8) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r5 = dup(r4) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r8, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYRES32=r9, @ANYBLOB], &(0x7f00000002c0)=0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=r9, @ANYBLOB="910000004e8c8c37424d8cebe3dcfd36e289bec65ba622fd07118418e6da2293360a0783e8a9458a7c02bb7cca6df137b741052705c539c33caf856c3d997680ec7dfd1ed9668c50fe2d237ba4a5585fd26666f556e09765ec53521e61a5d3318ce6f8afd31b18dca63daa2ba5a157da034fbe5351e743a3ec49af65e37c8f4fd6b7cd4d3bdd16e99fe0bc02d589a4e4ac8c"], 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={r9, @in={{0x2, 0x4e20, @loopback}}}, &(0x7f0000000680)=0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000009c0)={r9, 0x6}, &(0x7f0000000a00)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000a40)=@assoc_id=r10, &(0x7f0000000a80)=0x4) pipe2(&(0x7f0000000000), 0x184000) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000600)=""/29, &(0x7f0000000640)=0x1d) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000005940)={0x0, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0x4, 0x13, 0x8, "5ec9127d35b55e0a8e2d657b9a605a47660ed480af0975359c143cac4eaae7133e89866a9742d7afc86fec3012d00e09ea0a2a042a886a9e05186cd52eb1c9dd", "4ebd2856d7cddc5e07bbf8f205ab826b97e17fe3fa40c449d5c8b4cf7ec0db3422bd5987a150f82c547efbf6cba5135c3c9831d161ea85783796638c2bf13508", "f045ceb9a8d5064cf2c5a649a4d2a50271199a6672ad70c6a4a8db7234dba3ab", [0x80, 0x80]}) open(&(0x7f0000000040)='./file1/file0\x00', 0x40, 0x60) r11 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r12 = dup(r11) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) r15 = ioctl$KVM_CREATE_VCPU(r14, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r12, r15, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r12, 0x400454d9, &(0x7f0000000ac0)={'yam0\x00', 0x8757fce9b91039c8}) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') [ 2420.861895][ T880] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xffff, 0x200) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000280)=0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000000)=""/49, &(0x7f0000000040)=0x31) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r3 = accept(r2, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r3, &(0x7f000000b680)={0x0, 0xffffffffffffffab, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setfsgid(0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) recvfrom$unix(r4, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup3(r6, r5, 0x0) recvfrom$unix(r7, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r8 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r8, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r8, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r8, &(0x7f0000000100)=@abs, 0x6e) 04:29:18 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) recvfrom$unix(r4, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1000, 0x0) r6 = socket(0x1e, 0x2, 0x0) bind(r6, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r6, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r7, @ANYBLOB="5f47e8990e39a4bdbc4c880300"/22], &(0x7f0000000800)=0xa) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000140)={r7, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r7, 0x7fff, 0x6, 0x6, 0x7}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000200)={r8, 0x8}, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r9 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r9, &(0x7f0000000140)={&(0x7f0000000040)=@nfc={0x33, 0x3}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000000)="c109000000002c0020fe141aac141412e0000001f5de6a0c15961ff499f27015a1f00ffb661be6e7", 0x5c4}], 0x1}, 0x0) [ 2421.182992][ T1187] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:18 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:18 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000080)={r7, 0x6769}) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 04:29:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000000c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x81, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, &(0x7f00000002c0)={0x10005, 0x4, 0x3}, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x4}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r2, 0x0, 0x8, &(0x7f0000000000)='GPLeth0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r3}, 0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x779c7c060c487abd, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0xe040, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x2, 0x80000000000000d5, [0x0]}, 0x2de) r4 = socket$alg(0x26, 0x5, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000100)={0x0, @aes128}) 04:29:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6d}, [@ldst={0x4, 0x0, 0x4}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) write$P9_RSTAT(r2, &(0x7f00000000c0)={0x69, 0x7d, 0x1, {0x0, 0x62, 0x0, 0x2, {0x2, 0x0, 0x4}, 0x20000000, 0x81, 0x2, 0x101, 0x8, '$trusted', 0x0, '', 0xc, '{:-{}!++eth0', 0x1b, 'lo{keyringsecurityPvmnet1-.'}}, 0x69) 04:29:19 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000001300039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:29:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x2, 0x1, 0x2, 0x0, 0x0}, 0x2c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r2, r1, 0x0) recvfrom$unix(r3, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet_udp_int(r3, 0x11, 0x1, &(0x7f0000000040)=0x5, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000240), &(0x7f0000000100)}, 0x20) 04:29:19 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00\x87\xec\x80\xa4\xb5.\x17\'\x8c\x97\xcd]K\xd01@\xea\x82\xb4x\xe9\xceNC\xe4\xd6\xf1\x89\x8bIY\xbbE\xaf\xb9\x8a\x12e\x1c\xc7;\x00\xb2\xfc\xff\x03\xfb\x19\xb7\xf3\xf1\xf333\xed\x05#4\x98\xfc>_\x98\x7f\x86%\xf7\x8e\x8a\x13@\xd7\xd3#\x98\xec>\xae\x1e];\x10\xea\x93\xff\xb0\xfe\xd1\xcfU\xce\x17\xbb\xc7\x92h\x1cb\r}r\x03\f\xbe\x10Nzj\x15l\xe3\x17\xab\x8b\x8fnX\xb1DT\xa9\xf7\xfd\x17{R2P\xa55\x94R\x92;y\x8e\xe8', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0xc) recvmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/156, 0x9c}, {&(0x7f0000000480)=""/218, 0xda}, {&(0x7f0000000680)=""/150, 0x96}, {&(0x7f0000000080)=""/53, 0x35}], 0x4, &(0x7f0000000740)=""/207, 0xcf}, 0x6}, {{&(0x7f0000000300)=@xdp, 0x80, &(0x7f0000003b80)=[{&(0x7f0000000200)=""/30, 0x1e}, {&(0x7f0000000840)=""/226, 0xe2}, {&(0x7f0000000580)=""/62, 0x3e}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000001940)=""/117, 0x75}, {&(0x7f00000019c0)=""/154, 0x9a}, {&(0x7f0000000940)=""/82, 0x52}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/4105, 0x1009}, {&(0x7f0000003b00)=""/70, 0x46}], 0xa, &(0x7f00000005c0)=""/43, 0x2b}, 0x1af}, {{0x0, 0x0, &(0x7f0000003d40)=[{&(0x7f0000003c40)=""/217, 0xd9}], 0x1, &(0x7f0000003d80)=""/14, 0xe}, 0x34}, {{&(0x7f0000003dc0)=@nfc_llcp, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003e40)=""/183, 0xb7}], 0x1, &(0x7f0000003f40)=""/129, 0x81}, 0xcf}, {{&(0x7f0000004000)=@l2, 0x80, &(0x7f00000040c0)=[{&(0x7f0000004080)=""/21, 0x15}], 0x1, &(0x7f0000004100)=""/6, 0x6}, 0x7ff}, {{&(0x7f0000004140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000005580)=[{&(0x7f00000041c0)=""/4096, 0x1000}, {&(0x7f00000051c0)=""/59, 0x3b}, {&(0x7f0000005200)=""/213, 0xd5}, {&(0x7f0000005300)=""/135, 0x87}, {&(0x7f0000000b00)=""/91, 0x5b}, {&(0x7f0000005440)=""/63, 0x3f}, {&(0x7f0000005480)=""/230, 0xe6}], 0x7, &(0x7f0000005600)=""/216, 0xd8}, 0x100}], 0x6, 0x100, &(0x7f0000005880)={0x0, 0x989680}) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f00000058c0), &(0x7f0000005900)=0x8) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r5 = dup(r4) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r8, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYRES32=r9, @ANYBLOB], &(0x7f00000002c0)=0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=r9, @ANYBLOB="910000004e8c8c37424d8cebe3dcfd36e289bec65ba622fd07118418e6da2293360a0783e8a9458a7c02bb7cca6df137b741052705c539c33caf856c3d997680ec7dfd1ed9668c50fe2d237ba4a5585fd26666f556e09765ec53521e61a5d3318ce6f8afd31b18dca63daa2ba5a157da034fbe5351e743a3ec49af65e37c8f4fd6b7cd4d3bdd16e99fe0bc02d589a4e4ac8c"], 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={r9, @in={{0x2, 0x4e20, @loopback}}}, &(0x7f0000000680)=0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000009c0)={r9, 0x6}, &(0x7f0000000a00)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000a40)=@assoc_id=r10, &(0x7f0000000a80)=0x4) pipe2(&(0x7f0000000000), 0x184000) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000600)=""/29, &(0x7f0000000640)=0x1d) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000005940)={0x0, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0x4, 0x13, 0x8, "5ec9127d35b55e0a8e2d657b9a605a47660ed480af0975359c143cac4eaae7133e89866a9742d7afc86fec3012d00e09ea0a2a042a886a9e05186cd52eb1c9dd", "4ebd2856d7cddc5e07bbf8f205ab826b97e17fe3fa40c449d5c8b4cf7ec0db3422bd5987a150f82c547efbf6cba5135c3c9831d161ea85783796638c2bf13508", "f045ceb9a8d5064cf2c5a649a4d2a50271199a6672ad70c6a4a8db7234dba3ab", [0x80, 0x80]}) open(&(0x7f0000000040)='./file1/file0\x00', 0x40, 0x60) r11 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r12 = dup(r11) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) r15 = ioctl$KVM_CREATE_VCPU(r14, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r12, r15, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r12, 0x400454d9, &(0x7f0000000ac0)={'yam0\x00', 0x8757fce9b91039c8}) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') 04:29:21 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000080)={r7, 0x6769}) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 04:29:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x2}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(0xffffffffffffffff, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) shmget(0x0, 0x2000, 0x200, &(0x7f0000ffb000/0x2000)=nil) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r6, 0x5381) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000560007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:29:21 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000004800039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:29:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='nex/snmp6\x00p\xe3RH\xba\xb8\xcd\xe2|3q\xa5\x9d\xc3\xff\xcd\xb0Z\xe3`M5!\x913I\xd8\xdf\x87\x01\xde\x8cJ\xa2\x1d\x8ea\f\x81k\x89cE\x19^7/\xd0u\x9b\xc8\x8f\xf2\x13n\xb4(\'q\n\x19\x18\xc1)@\xa1\xef\xf5\xfdwZ9zO*\x04\xca\xc3\xdb\xde\xac*\xa5Xz\x93\xee\x94\xf9\x89Y6') geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000300)) setregid(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000300)) setregid(0x0, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in6=@empty, @in=@remote}}, {{@in=@local}}}, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in6=@empty, @in=@remote}}, {{@in=@local}}}, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) getresuid(&(0x7f0000000100), &(0x7f0000000200)=0x0, &(0x7f0000000240)) fsetxattr$security_capability(r3, 0x0, &(0x7f0000000300)=@v3={0x3000000, [{0x4, 0x3ff00}, {0x8, 0x9}], r4}, 0x18, 0x3) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {}, [], {}, [], {0x10, 0x6}}, 0xfffffffffffffdb1, 0x1) getresgid(&(0x7f0000000780), &(0x7f00000007c0), 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000940)={{}, {0x1, 0x1}, [{}, {}], {0x4, 0x6}, [{}], {}, {0x20, 0x4}}, 0x3c, 0x2) getresgid(0x0, &(0x7f00000007c0), 0x0) r5 = getegid() setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {0x1, 0x1}, [], {}, [{}, {0x8, 0x0, r5}], {}, {0x20, 0x4}}, 0x34, 0x2) getresgid(&(0x7f0000000780), &(0x7f00000007c0), 0x0) getegid() setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fsetxattr$system_posix_acl(r6, &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r7 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in6=@empty, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000e40)=0xe8) fsetxattr$system_posix_acl(r7, &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) [ 2423.811800][ T1862] validate_nla: 3 callbacks suppressed [ 2423.811811][ T1862] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:21 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:21 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r2, r1, 0x0) recvfrom$unix(r3, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) r7 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0xf2, 0x42, 0x4, 0x0, 0x0, 0x4, 0x2000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xff, 0x3}, 0x2080, 0x1f, 0xffff, 0xb, 0x40, 0x8, 0x5}, r6, 0xb, 0xffffffffffffffff, 0x2) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r8, 0x84, 0x6d, &(0x7f0000000900)=ANY=[@ANYBLOB="ab000000a6d23fa0c9cb488b6190f2d1d89677354590dde5ffb3b62ccfa516aec8038d48d684fba227e9983be9f367da66938eddee11b1613f0d5ff3b2213cdf2bd00a8ae552bc17ec5e976fa67846060aa7629aed35eb9b10acb8c0dff4569bb0f6a15cab46fa86a3856eb778df7afa4a3112676e9547e0d65bee83afa0b4f46a0b10af299da7efdcc6c573074de84403de7902a0709672cbd7f433150495355bd65460a5a52aa9cc384c962b12062cf85884362f08008b07e63b9e6cd2c685f6342291c9e88fa92f89d2f5625f166f893177296d144729691d4da3f454f4520902a44051a6e9f6e4797976fbd0bdf131311d1841caa3a58be7c6bc8e37308d9d820a2f85ab2bb215a78b78884341ff795190255fb20026cdd8ad7a7761e4f41cf4a3b4b43c085fe0659fc6a246bdb559f3393f3a168a21415fd9e2be89cfc63f2c763c13a94bc84279fc594cf2d513d56e43ea3a97a3fe9d42206c45555bf0ea7c495f2299ed348070a9299e78c22b02e89bc00c86ebf64f8a8abf1fe9d67bfe9a6ce144f007a2c204f27b6d5527f940658debf5"], &(0x7f0000000540)=0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) setuid(r9) r10 = request_key(0x0, &(0x7f0000001300)={'syz', 0x2}, &(0x7f0000001340)='em0cpusetmime_type\x00', 0xfffffffffffffff8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) keyctl$chown(0x4, r10, 0x0, r11) fchown(r7, r9, r11) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000080)={0x8, {{0x2, 0x4e21, @local}}}, 0x88) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000001c0)) r12 = syz_open_procfs(0x0, &(0x7f0000001140)='net/route\x00') r13 = socket$inet_tcp(0x2, 0x1, 0x0) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) dup2(r12, r0) 04:29:21 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x100000) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f00000001c0)={0x2, &(0x7f0000000040)=[{0xcdb, 0x1, 0xfa, 0x342}, {0x3, 0x39, 0x7, 0x3}]}) r1 = perf_event_open(&(0x7f000001d000)={0x4, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x8428}, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r4, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) socket$netlink(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) r6 = accept(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af31564567ff6142bf2b93d6f80a7cc467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7020000005e31c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x80, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r10 = accept$alg(r9, 0x0, 0x0) r11 = dup3(r10, r9, 0x0) recvfrom$unix(r11, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r11, 0x40086432, &(0x7f0000000480)=0x4) ioctl$KVM_GET_XCRS(r8, 0x8188aea6, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000005000000fd200000000000000e000000000009000000000000009ed08b3a35e5b1712b09002a0c7a58e7e8487ff8e77c6d2aa84d759ffee9d4d5d3c70e7193495e9c0e03b4e82b5fe40cae4438db39be7080c17d01efa193e7dde3dca53070371a1a000e0f2f520b259a3d1906823cbe7ff4d9e17039559daa26b8cf6763a20bcf28ec577fa864f2b2230d"]) r12 = accept$alg(r7, 0x0, 0x0) r13 = dup3(r12, r7, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f00000003c0)) recvfrom$unix(r13, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(r13, 0x29, 0x3b, &(0x7f0000000280)=@srh={0x84, 0x2, 0x4, 0x1, 0x1, 0x40, 0x7, [@empty]}, 0x18) recvmsg(r6, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) [ 2424.121859][ T2139] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:21 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000080)={r7, 0x6769}) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 04:29:21 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f0000000080)=[{}], 0x145) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r2, r1, 0x0) recvfrom$unix(r3, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) r4 = accept$inet(r3, &(0x7f0000000000), &(0x7f0000000300)=0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000340)={0x4fbed8871ff710d7, 'ip6gretap0\x00', 0x2}, 0x18) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000080)={r7, 0x6769}) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 04:29:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) modify_ldt$read(0x0, &(0x7f0000000000)=""/42, 0x2a) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:22 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$TIOCGICOUNT(r5, 0x545d, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000013000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:modules_dep_t:s0\x00', 0x23, 0x3) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup3(r9, r8, 0x0) recvfrom$unix(r10, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="738fff081d8bfef23e21e49cbfc46a2eeb7c88835c0100e9b152f917b214270dcb1cd7a69069f544b248f85916e99a8cad825935dca7b6584124e6fbc3561a76a7037628000000000000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x11, &(0x7f00000000c0)={r11}, 0xffffffffffffffdc) r12 = request_key(0x0, &(0x7f0000001300)={'syz', 0x2}, &(0x7f0000001340)='em0cpusetmime_type\x00', 0xfffffffffffffff8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) keyctl$chown(0x4, r12, 0x0, r13) keyctl$assume_authority(0x10, r12) dup2(r1, r6) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r14, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) dup3(0xffffffffffffffff, r2, 0x0) 04:29:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40000, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfd77e4ef05f7e1, 0x0, 0x0, 0x35a) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffff6) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000000)={0x0, 0x7}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000040)={0x7, 0x0, 0x10001, 0x7, 'syz1\x00', 0x6}) 04:29:22 executing program 4: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x78) syz_open_dev$evdev(0x0, 0x0, 0x0) getpid() syz_open_dev$sndctrl(0x0, 0x407fbfffffffb, 0x0) unlink(0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000080)={0x4, "9dca50784274d08abbb1fcd26d90a7ee5176258bac03b932ee94abb540d9629b"}) syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x8, 0x2000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x10001, 0x8000}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000002c0)={r1}) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x4a00, 0x4) socket$rxrpc(0x21, 0x2, 0x440010004000007) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="170000df2502108000fe00000807090000000001000000000000000000000000b8783cdb3d37508bfa927c8ab1976b62a196747fae6187c3d4722871e81fc3d3e7cd8da0066eb205fb288efd1cb8c5ba963460bbd63a888666a9d955673ae10fa9a804353eec675e82bdb3ab9d9f48902135dc5ab2055628ab33957b6d0f35fe2141ce531c9df6acca000001"], 0x1}, 0x1, 0x0, 0x0, 0x8004}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup3(r6, r5, 0x0) recvfrom$unix(r7, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) r8 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1000, 0x0) r9 = socket(0x1e, 0x2, 0x0) bind(r9, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r9, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r9, 0x84, 0x77, &(0x7f00000007c0)={r10, 0x3, 0x1, [0x1]}, &(0x7f0000000800)=0xa) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r8, 0x84, 0x71, &(0x7f0000000140)={r10, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000340)={r10, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x1}}, 0x5, 0xfbd}, &(0x7f0000000400)=0x90) recvfrom$unix(r4, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r4, 0x8008ae9d, &(0x7f0000000140)=""/53) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) unshare(0x40000000) [ 2424.875621][ T2406] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:22 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:22 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x140000) write$P9_RWRITE(r0, &(0x7f0000000340)={0xb, 0x77, 0x2, 0x9}, 0xb) r1 = gettid() r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) recvfrom$unix(r4, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000300)={0x9, 0x7, 0x8, 0x95c, 0x17, 0x40, 0x1, 0x80, 0xd4a, 0x80}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vat\xa8\x03\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r5, &(0x7f0000000200)=""/39, 0x27, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000180)) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup3(r7, r6, 0x0) recvfrom$unix(r8, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r8, 0x400454cd, 0x2b) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f00000002c0)) fchown(0xffffffffffffffff, 0x0, r9) [ 2425.164896][ T2600] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:22 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:22 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000080)={r7, 0x6769}) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) [ 2425.379154][ T2633] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000220001ee000000c5ad34d09c0f459fad187f422780000000000000000000d3316b296daf66c303d8ca9a624b86f5a21ec000350bae1e176755095d5249"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@getae={0x5, 0x1f, 0x0, 0x0, 0x0, {{@in6=@mcast2}, @in=@broadcast}}, 0x40}, 0x8}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) write$ppp(r3, &(0x7f0000000080)="ff78dd048d8a4d6eba2bfd9e6e84aa33fb18840e9459d83139fb6a7771f1b6016a8f236564a018e25b5b97541d048c91ee653a0e3fbfaf75ddde98a6e4f9478a2bf7cdf3a6a2d93c645a2e3f6a0d253a23fee36188963af476e2f215c8c8dba9a7afabf74332802932d11e6d623bc8c31391", 0x72) [ 2425.427146][ T2412] IPVS: ftp: loaded support on port[0] = 21 04:29:23 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:23 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000080)={r7, 0x6769}) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) [ 2425.745626][ T2897] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0x3}, 0x1, 0x0, 0x0, 0x40040010}, 0x8000051) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000280)=0x5) ioctl$VIDIOC_SUBDEV_S_EDID(r3, 0xc0285629, &(0x7f00000001c0)={0x0, 0x9, 0x0, [], &(0x7f0000000040)=0x20}) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f00000002c0)=""/20, 0x4}, {&(0x7f000000b500)=""/153, 0x7ffff177}], 0x2, 0x0, 0x194, 0x7}, 0x0) 04:29:23 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r2, r1, 0x0) recvfrom$unix(r3, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14, 0x69, 0x1, {0x10, 0x2, 0x8}}, 0x14) 04:29:23 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:23 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000080)={r7, 0x6769}) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) [ 2425.912591][ T2591] IPVS: ftp: loaded support on port[0] = 21 [ 2426.013098][ T3015] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2429.291584][ C1] net_ratelimit: 4999 callbacks suppressed [ 2429.291596][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2429.311332][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2429.323581][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2429.335940][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2429.348232][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2429.360565][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2429.372823][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2429.386062][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2429.399709][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2429.412110][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:29:27 executing program 4: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x78) syz_open_dev$evdev(0x0, 0x0, 0x0) getpid() syz_open_dev$sndctrl(0x0, 0x407fbfffffffb, 0x0) unlink(0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000080)={0x4, "9dca50784274d08abbb1fcd26d90a7ee5176258bac03b932ee94abb540d9629b"}) syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x8, 0x2000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x10001, 0x8000}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000002c0)={r1}) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x4a00, 0x4) socket$rxrpc(0x21, 0x2, 0x440010004000007) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="170000df2502108000fe00000807090000000001000000000000000000000000b8783cdb3d37508bfa927c8ab1976b62a196747fae6187c3d4722871e81fc3d3e7cd8da0066eb205fb288efd1cb8c5ba963460bbd63a888666a9d955673ae10fa9a804353eec675e82bdb3ab9d9f48902135dc5ab2055628ab33957b6d0f35fe2141ce531c9df6acca000001"], 0x1}, 0x1, 0x0, 0x0, 0x8004}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup3(r6, r5, 0x0) recvfrom$unix(r7, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) r8 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1000, 0x0) r9 = socket(0x1e, 0x2, 0x0) bind(r9, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r9, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r9, 0x84, 0x77, &(0x7f00000007c0)={r10, 0x3, 0x1, [0x1]}, &(0x7f0000000800)=0xa) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r8, 0x84, 0x71, &(0x7f0000000140)={r10, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000340)={r10, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x1}}, 0x5, 0xfbd}, &(0x7f0000000400)=0x90) recvfrom$unix(r4, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r4, 0x8008ae9d, &(0x7f0000000140)=""/53) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) unshare(0x40000000) 04:29:27 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 04:29:27 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x200, 0x4) r4 = accept$alg(r2, 0x0, 0x0) r5 = dup3(r4, r2, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r5, 0x110, 0x2, &(0x7f0000000000)='pcbc(fcrypt)\x00', 0xd) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r6 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r6, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:27 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0xfeca}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) lstat(&(0x7f0000000f00)='./file0\x00', 0x0) socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xb, 0x222a6d8102856fd9) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="79bad2df0ea2eebdfe2d68e8e9be5e0b091c5cddbfe576666864e10de1d6b256762ca9b08b5b8c441a8eecb38f12e81999da87c85718e49025603da8afe11a6145a225752ded10c187c3ffa16b36117c19caadc6a7ecf815af566f0f10b733d72e126508f109a46920fcccac7cd0e01bd1f1b3a95b4382a8943c20856b80664b95d965c21ca36455d8364744d15e7720846c0a84370078bae0ad", @ANYRES32=0x0], &(0x7f000095dffc)=0x2) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') sendfile(r2, r3, 0x0, 0x1000000000e6) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000400)=ANY=[@ANYRES32=r6, @ANYBLOB="000001ee4625315f2500d09df3e45e525ede1d7a2683803a9be7735ffb52ed14428226264c497576e670e0ac55740dcf9bad0946a3390ba1258e9d7d6b503a57bb5982927635f79cbee36802875002e919"], 0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={r6, 0x6, 0x8c}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x11}}}}, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={r1, 0x8000, 0x1}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000340)='.dead\x00', 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r7 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r8 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r8, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) sendfile(r0, r7, 0x0, 0x102000002) 04:29:27 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200000, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) recvfrom$unix(r4, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000000)={0x0, 0xff15, 0x1000, 0x20}, 0x10) writev(r0, &(0x7f0000000440)=[{&(0x7f00000000c0)='N', 0x1}], 0x1) [ 2429.846040][ T3218] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2429.856188][ T3211] QAT: Invalid ioctl 04:29:27 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:27 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}, 0x20a0, 0x0, 0x0, 0x0, 0x9b76}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x10000, 0x80000000}, 0xc) socket$kcm(0x2, 0x8f84df8a5aa5e22b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f00000002c0)) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000004c0), 0x4) r6 = socket$kcm(0x2, 0x7, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000380)=r7, 0x4) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, r9, 0x0, 0xc, &(0x7f0000000500)='cgroup.stat\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0xac18, 0x0, 0x3f, 0x0, 0x0, 0x78, 0x200, 0x0, 0x7, 0x23b, 0x9, 0x3, 0x2, 0x9, 0x101, 0x7f6, 0x81, 0x6aa, 0x0, 0x10000, 0x0, 0x9, 0xbc2, 0x1, 0x80000001, 0x20, 0x2, 0x7, 0x1ff800000000, 0x3f, 0x53ed6220, 0xffffffffffffffff, 0x2, 0x100, 0x8, 0x0, 0x0, 0x9900, 0x2, @perf_config_ext={0x0, 0x3f}, 0x0, 0x1950000000, 0x1, 0x9, 0x100, 0x4, 0x8}, r10, 0x1, r9, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xd, 0x7ff, 0x40, 0x7, 0x40, 0x1, 0x10001, [], 0x0, r9, 0x2, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xb, 0x1ff}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xbfffffffffffffff, r8, 0x0) ioctl$PERF_EVENT_IOC_RESET(r8, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz0\xfe', 0x1ff) r11 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r11, &(0x7f0000000280)={0x0, 0xffffffffffffff6c, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 04:29:27 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2430.196895][ T3432] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:27 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 04:29:28 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d000000000fc00039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:29:28 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2430.650075][ T3277] IPVS: ftp: loaded support on port[0] = 21 [ 2430.698782][ T3710] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:28 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000000)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:28 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:28 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 04:29:28 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2431.096639][ T3800] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:28 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:28 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2431.468190][ T3913] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:29 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:29 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 04:29:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xfffffffffdffffff, 0xffffffffffffffff, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) dup3(r2, r0, 0x0) r3 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b92190e5ed10ae06bfa53a6f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b003ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$KVM_SET_PIT2(r6, 0x4070aea0, &(0x7f0000000140)={[{0x7, 0x7, 0x9, 0x6, 0x9, 0xff, 0xa8, 0xf7, 0x0, 0x5, 0x7}, {0x800, 0x2, 0x1f, 0x2, 0x3, 0x9f, 0x7, 0x1, 0x6, 0x1, 0x80, 0xc0}, {0x60, 0x8001, 0xc, 0x3f, 0x79, 0x5, 0x33, 0x1, 0x3, 0x8, 0x3, 0x40, 0x1000}], 0x66052c70}) recvmsg(r3, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:29 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:29 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:29 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2432.153090][ T3926] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:29 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:29 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:30 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x65}, 0x1) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2bb216f80a7ec467d960625d9e61bd464ffff02d75753f633ca7c637a9ba634d7444fc5736531e70f7e1f651feee5b1a8b74b0100e29542b0b96b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r1, &(0x7f000000b680)={0x0, 0xfffffe7a, &(0x7f000000b600), 0x100000000000024d, 0x0, 0xfffffffffffffede, 0x7}, 0x7512271157c10c1c) [ 2432.409475][ T4162] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:30 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:30 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 04:29:30 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:30 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:30 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="ffff030061edc67144d5cb2792f32cf9a459a566be5e875c8aca5a52088dea00b45a84f378df1244dcb8c1643836b363b0d268bd837dc150dfc7559cffb46355e279433e4b5d08a78ef5d143471b28651f8b", @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600), 0x0, 0x0, 0x0, 0x7}, 0x0) [ 2432.786619][ T4554] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:30 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:30 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) [ 2433.088368][ T4645] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:30 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:30 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000000)=""/128, 0xffff}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:31 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup3(r5, r4, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2}) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) [ 2433.441811][ T4782] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:31 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:31 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:31 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:31 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:31 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:31 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:31 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:31 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:31 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:31 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2434.434533][ C1] net_ratelimit: 2583 callbacks suppressed [ 2434.434555][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.453027][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.465501][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:29:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) [ 2434.478073][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.491467][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.505752][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2434.518192][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:29:32 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2434.530603][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.543109][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.555515][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:29:32 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:32 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:32 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:32 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:32 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:32 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2434.990685][ T5239] validate_nla: 4 callbacks suppressed [ 2434.990695][ T5239] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:32 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:32 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:32 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2435.271329][ T5255] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:33 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed27400de8159937bb51665a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:33 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:33 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:33 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:33 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:33 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2435.911701][ T5470] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:33 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:33 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:33 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:33 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2436.139852][ T5477] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:33 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:34 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2436.491692][ T5488] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x28a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) recvfrom$unix(r4, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup3(r6, r5, 0x0) recvfrom$unix(r7, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000280)={{{@in=@multicast1, @in=@initdev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xffffffffffffff1a) r8 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01000000000c1862bb46398ef10014faff0058988af315f07001c3142bf2b9214c80a7ec467d96060cd9e61bd464d5044ab4eb1975c4617c637a9ba634d7444fc5736531c80fa951b29beee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) accept$alg(r8, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x1, 0x80, 0x7, 0x20, 0x0, 0xe5, 0xf1028, 0xb, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x6, 0x6}, 0x1210, 0x800, 0x2, 0x2, 0x91, 0x7, 0x2}, 0x0, 0xe, 0xffffffffffffffff, 0xc) recvmsg(r8, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:34 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:34 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2436.713488][ T5598] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:34 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:34 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:34 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:34 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:34 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) r3 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x1) fsconfig$FSCONFIG_SET_STRING(r3, 0x1, &(0x7f0000000040)='-security\\@wlan0\x00', &(0x7f00000001c0)=']self-keyringppp0\\eth0.\xfa\x00', 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) [ 2437.097766][ T5814] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:34 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:34 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:34 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2437.425988][ T6125] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:35 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:35 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:35 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:35 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2437.941626][ T6235] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:35 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:35 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:35 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) recvfrom$unix(r4, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$KVM_GET_XCRS(r4, 0x8188aea6, &(0x7f0000000000)={0x3, 0x0, [{0x0, 0x0, 0x505d}, {0x4fa, 0x0, 0x100}, {0x4, 0x0, 0x7}]}) r5 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r5, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) [ 2438.230882][ T6345] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:35 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:36 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:36 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:36 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000060039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:29:36 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:36 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:36 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:36 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:36 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2439.455602][ C1] net_ratelimit: 900 callbacks suppressed [ 2439.455614][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.474039][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.486480][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.499055][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.512427][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.526597][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2439.539012][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.551500][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.564039][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.576419][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:29:39 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:39 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:39 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:39 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-neon\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r2, r1, 0x0) recvfrom$unix(r3, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000003c0)=@nat={'nat\x00', 0x1b, 0x5, 0x530, 0x128, 0x258, 0x378, 0x258, 0x258, 0x498, 0x498, 0x498, 0x498, 0x498, 0x5, &(0x7f0000000340), {[{{@uncond, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@inet=@socket1={0x28, 'socket\x00', 0x1, 0x1}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x600, 0x1, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x3, @multicast2, @broadcast, @gre_key=0x1, @icmp_id=0x66}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x7f}, @loopback, 0x7ffffe7e, 0xff, 'gre0\x00', 'veth1_to_hsr\x00', {0xff}, {0xff}, 0x69, 0x0, 0xa}, 0x0, 0xf8, 0x130, 0x0, {}, [@common=@inet=@tcp={0x30, 'tcp\x00', 0x0, {0x4e22, 0x4e22, 0x4e21, 0x4e23, 0x0, 0x4, 0xc2, 0x8}}, @common=@unspec=@mark={0x30, 'mark\x00', 0x1, {0x4, 0x7fff, 0x1}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @multicast1, @multicast1, @gre_key=0x100, @gre_key=0x8}}}}, {{@ip={@broadcast, @broadcast, 0xff000000, 0xff000000, 'team_slave_0\x00', 'veth0_to_bond\x00', {}, {}, 0x2132c1c8ee35292, 0x0, 0x15}, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@inet=@set4={0x50, 'set\x00', 0x4, {{0x7ff, 0x3d, 0x1}, {0x9, 0x80}, {0x6, 0x81}, 0x40}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x4, @local, @empty, @icmp_id=0x65, @gre_key}}}}, {{@ip={@local, @multicast2, 0xffffffff, 0xff000000, 'nr0\x00', 'gretap0\x00', {}, {}, 0x1, 0x1, 0x23}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x4, 0x8, 0x6}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xfff9, [0x4, 0x1f, 0x47, 0x5, 0x7, 0x6], 0xea, 0x7f}, {0x4, [0x7fff, 0x3f, 0x4, 0x2, 0x7, 0x9], 0x40, 0x39}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x590) r4 = accept(r0, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000e40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x16004050}, 0xc, &(0x7f0000000e00)={&(0x7f0000000180)={0x1c, 0x0, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000c80)="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", 0x4) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup3(r6, r5, 0x0) recvfrom$unix(r7, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRESHEX=0x0, @ANYBLOB="00000000008c1862bb46398ef100140001df3b72066cb2ba61f315f07001c31434f2b9216f80a7ec467d96060cd9e61bd464d59430575757f633ca7c637a9ba634d7444fc5736531c80f7e1f65e39542b0b98610ceed274014b56b072ea4e9"], 0x3}}, 0x8000051) recvmsg(r4, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r8, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) ioctl$EXT4_IOC_MIGRATE(r8, 0x6609) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r9, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r10, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r11, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000a40)={r10, r11, 0x3f, 0xa8, &(0x7f0000000980)="410b46e1b099e0d1a0198f7c7f7ed9f5f9d65198dcc491b974f37a86ef80bb7daedf8bd434697673f089357653e3dbf219338d5d0a8e6e540c85378bc73b35a2352b2ae58b617540ed0a431e1b3f6715a2d7a1a0e7b8d6649d72a20e21a627f6d014c62c68f222b601fe8b02bf2ba30d333ce35f387921c6cdbd3c714b0578fe07871efb35eaef3fb01f903d9567b56ebd34edfe24e76d38a0b7689a9028b9293b2507ee7b2a3ee6", 0x6, 0x81, 0x7, 0x2, 0x6, 0x0, 0x9, 'syz0\x00'}) write$binfmt_elf32(r9, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0xf5, 0x4, 0x5, 0x83, 0x3, 0x0, 0x6, 0x3, 0x26b, 0x38, 0x24e, 0x5, 0x1, 0x20, 0x1, 0x3, 0x5, 0x17c1}, [], "e046a20f9a854c9fb169e5137abce8068fb7ae0c13af1dda177b4f138e29e804d0a76b85f0fdb98e63811de83b86345572b6b16f"}, 0xc61) 04:29:39 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2441.635365][ T6694] validate_nla: 4 callbacks suppressed [ 2441.635374][ T6694] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:39 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:39 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2441.992864][ T6911] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:39 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r3, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:39 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:39 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2442.291000][ T6920] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:39 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2444.462964][ C1] net_ratelimit: 6337 callbacks suppressed [ 2444.462977][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2444.481180][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.493467][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.505933][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.518164][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.530659][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.543379][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.557747][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2444.570185][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.582599][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:29:42 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:42 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:42 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:42 executing program 1: socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'team0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2b}}}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r4, &(0x7f0000000240)={0x0, 0xffffffffffffff0f, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="000063702ee6403a032e13b6e0ab58b42033101a1ab62e85433d3c3cd8661a5d3fc667d073f05885040599d762c4878f2944454dc6184f4643d3966ab3e3e6bf6a7a5193e2f101ca60695e4427841e2c2aa587caf4f6c5f9317a8ff39355f663c95e28e8510cd7c37c31bf34973e8f2bc910bfbc69deaf5835fe931378", @ANYRES32=r1, @ANYRESHEX=0x0], 0xfffffd33}}, 0x8040051) r5 = socket$alg(0x26, 0x5, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000040)={0x1f, 0x17, 0x5, 0xfffd, 0xf8, 0xfffffff7, &(0x7f0000000380)="9184c2f0b31c4f27eda74fe14af700da2ee3348ae0d950a81af41891e394ba68ff653d7b90b16780bcbafa64bb2eccb16b4b944ad75034a7c6fe207c17788e39926e1cde7b325e740fbd75e31ed81fba8d862021ad7d0e7576a7ec22d495e1aaa2d76cd65234b60d1755a7b39cadb7d44173203e4e8fbcd62a99b427f61f05c1cac1f0f28d12aaae605960650495e10eba50eccdf2591a9b222a5f0dda16b96161b9909df8c64f43f27fe60aa3f3dd5df4f9e1c539c64e27c10f6e1598a43982dd580464890f0d69ccd9ea96aad8d8e2512eee02685be4737e2ead1497ee7c245620f3aaf815f2b77b1d6cd9f4e64df63733eeba59d18612"}) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r5, 0x0, 0x0) dup3(r6, r5, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x400) recvmsg(r4, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:42 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:42 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2444.894496][ T7038] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:42 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d000000000fe80039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:29:42 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:42 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:42 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2445.247570][ T7349] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:43 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000081039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:29:43 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:43 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2445.615002][ T7651] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) dup3(r5, r4, 0x0) accept$alg(r4, 0x0, 0x0) r6 = dup3(r3, r2, 0x0) recvfrom$unix(r6, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000000)=0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="0701177f440300001d00000008000000e4010000030000000000000000000000371d23ca905c3673e8ee8cf01c7a29a4c43c93138811d189f65315d21ac7a840065c7b06d8203b0f09a67f5d75afcd25ed0c7650a9281c5ffeb800d46a58ba630bef2584dfca04d05b22b0767726854c4b58df4ca6d9f303e68f09a0133aa0735e150778f2b0226d95b58916e90ee18465be64198ffe36b2da20c0f0ac0f6d394ca300"/660], 0x294) semget(0x2, 0x4, 0x1) getsockopt$inet_mreqn(r6, 0x0, 0x20, &(0x7f00000003c0)={@broadcast, @broadcast, 0x0}, &(0x7f0000000400)=0xc) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup3(r9, r8, 0x0) recvfrom$unix(r10, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x12, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="f88d000000000000839ee6183b4c8509"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000300)=""/173, 0x100, 0x3, [], r7, 0x3, r10, 0x8, &(0x7f0000000440)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0x8, 0x2, 0x3}, 0x10}, 0x70) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r11 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r11, &(0x7f0000000240)={0x0, 0x371, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398eed001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r11, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:43 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:43 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2446.089875][ T7678] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:43 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:43 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:43 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x5}}, 0x0, 0xffff, 0x0, "80e0b01ed22bd8fd5bfe4edc4535ed1d07119a791ee285cb4aa38f9a061dc867ed672eead08619330df010b727a038bd3d5d080f190ca74e7b49ae3b51e03a94b239a8589772f810a78f5d4f6fdf0d99"}, 0xd8) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:43 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2446.388712][ T7788] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:44 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:44 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:44 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2446.675648][ T7993] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="3ceb04622f41a10c02edcfcff53daca953317c6b8c8b6a7e584ad09c4abe06960cf27bea1cc0c929d25876341ddf4a5433ccaefae4879ad091b6c8356ed162961c33629debf2b55730387b5f7095eac72dcd33663c65134d98bcfdacd9e92c45701993e07de9fba3673d26e6667714bce72ca23fff6c6e", @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:46 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:46 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:46 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:46 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:46 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058d88af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee395428b6e8602ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) getsockopt$inet_int(r5, 0x0, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 2448.940502][ T8216] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:46 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d00000000080fe039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:29:46 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2449.176543][ T8261] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:46 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r3, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:46 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:46 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2449.421639][ T8330] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2449.479724][ C1] net_ratelimit: 3922 callbacks suppressed [ 2449.479737][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2449.498963][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2449.513245][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2449.525669][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2449.538093][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2449.550579][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2449.562990][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:29:47 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r3, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2449.575487][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2449.588771][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2449.603013][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) 04:29:49 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r3, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:49 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:49 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:49 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r3, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:49 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) recvfrom$unix(r4, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) getsockopt$inet_int(r4, 0x0, 0x2, &(0x7f0000000040), &(0x7f00000001c0)=0x4) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0xffffffffffffffa7) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r5 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0x3}}, 0x8000051) recvmsg(r5, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) [ 2452.255180][ T8349] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:50 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:50 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:50 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2452.586664][ T8570] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xa}, 0x10000, 0x0, 0x0, 0x4, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="fded63443289fde26058a37f60a0a0ce2f6df0101228fb63a676605e2d639ed837a3462dc08130aab8c3c2ae18b139eeff221a7eb2d15d9bdaa211c3147da71cea30828f43fbd238d201f058fadf3cdfebdc518ca836be6917f410b43f1fd03593a32ab9a7ffc0040a22f275ef9fe1bbb52ffcee16b10dfdc3ceddc3e2f6109170c458022211b4683f028ab238496c", @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r4, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) r5 = socket$alg(0x26, 0x5, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f00000028c0)=0x800, &(0x7f0000002900)=0x2) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup3(r7, r6, 0x0) recvfrom$unix(r8, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r10, 0x23f, 0x0, 0x0, {{0x1, 0x0, 0xa00}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r8, &(0x7f0000005b80)={&(0x7f0000003040)={0x10, 0x0, 0x0, 0x19020}, 0xc, &(0x7f0000005b40)={&(0x7f0000004700)={0x1c, r10, 0x0, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000001}, 0x40) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r11, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) fcntl$getownex(r11, 0x10, &(0x7f0000003000)) r12 = accept$alg(r5, 0x0, 0x0) r13 = dup3(r12, r5, 0x0) recvfrom$unix(r13, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) accept$packet(r13, &(0x7f0000002940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002980)=0x14) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r15, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) ioctl$ifreq_SIOCGIFINDEX_team(r15, 0x8933, &(0x7f0000004640)={'team0\x00', 0x0}) sendmmsg(r3, &(0x7f0000006e40)=[{{&(0x7f0000000000)=@rc={0x1f, {0x8, 0x3f, 0x81, 0x2, 0x2, 0x1}, 0xf0}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000380)="338e04393b69d0456645a6029c7d776c7c97bd274ece55af506e2a49f45b90d4164921e8df45a3725405a3249dd5084249759e16244b2fdb18878de62584dfc17a566413704df01d8e149dcd1ab3f8836ae33a790cdf8579f7835209457190c05aaa7c5f8c4e7176a41075254732f546c3ad5f592383f327761988e5e6545abb04e98b66444bc936de7866394ea8d0cccf60c3268c9cea15a837f0ead2e5953b277c548add7a7f153990c74a10f95e5fd90d8acf148019c652bb58d41838551d2903fd4cfdc3ecf2af6697268ff6e1ade7486577", 0xd4}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000000140)="a53e5b450e6033ce44c8922a7236183b69276d36ad33f42d928ef31d8c9ba02f9a35191f59885bdacb374e0826d1c3137855dae198cd57fcba260c614000bfaeb023ecbd984695", 0x47}], 0x3, &(0x7f0000001480)=[{0x1010, 0x25f2f40a165f59b2, 0xc31c, "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"}], 0x1010}}, {{&(0x7f00000024c0)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x1, 0x4, 0x2, 0x3, {0xa, 0x4e20, 0x80, @local, 0x87}}}, 0x80, &(0x7f0000002580)=[{&(0x7f0000002540)="97c818cfe7e05d8f84ae93ce093307f6da162bdfa4b4c0520c07dd0afa946e74072abe9b07076784f47039e62ce465", 0x2f}], 0x1, &(0x7f00000025c0)=[{0xa8, 0x109, 0x80000001, "db8e02bb713712ae5e2ef4d30e27fd8b5d717da466b94ce63735e52a09ed887602410086f6f45cd01bda1b70be10e681a34fa55ebc5fb54fb38da57f9ad660afa8a15c22f5f9059bca6d947a0ee8601f4036e293bcf936e1602941adb8b5d2efef6d8e2b51398c7fe29db54d70b19f9b9906b4d9133d7fb85ea235f04d5f2a76b5ab484965c8d13881bf34035b5897b797a2f5"}, {0x48, 0x101, 0x3, "513127c783b5c5271ed67253b9d55f301a57a91afe517a961d3f232190c196b5679d58400a14c24acacd889563a42bcc3cd4c4"}, {0xf0, 0x119, 0x4, "63466f584384cba3e168658cc1a2d395f15d3007eb0923a21cae5ce1857b2866ae6c29e2094c7b0e0e309fa8036fa690a8cb46f642512de32875f0c5de92d9b1fd9e68a6deb1e29c4574f99bba367df7d09fa39bb72316b8d16cc73c8681f4e0b0c7159cb47035ce8789069abfddc37936ebbad7ba1dd2ebe166cc3384ea6dffe693d27310d13efacb90fc6e7757df98047fc6950b672f6b06283e4c7aa2a816b02512d2d4a18fad32a3c1dc5b80c6bc751de1e13c0be0bef77512fdb7810f10b6dd198bead9b1e0df5370a8964c58b9667226b92c7f7646076c572c"}, {0x70, 0x1, 0x3, "ddb103bf11c9ef0e22b3671762cef2cff89f02a38f9f9f683569941fc95c84b973f1721543d7439a62a80d1df985ef8aac3d57dd80f76ee4dbbec1a41897a186f8d091fb52fb15d9e090d4cf99199c7b331389e98c8a2e5b9f10f013791d40"}, {0xa8, 0x104, 0x8001, "6c71d9e5a8bcb270549e507a8989feada99d2f26971de39007ce43ed06e850eaad42801af14358c24bae31ac03773306ede76b96abd4a6539edfe1e31861d3f5bbd0fe6e42bc9e32494955ae8dc4c20e6d4f0b0ea92ff1fc1c9a1d967cc4866e36f85377f0340cef03762c0e0d6c3b10f44291e4ac3ce1ec6e189982efa38ac5c579ab2a1094739c4da789f77699671e28"}], 0x2f8}}, {{&(0x7f00000029c0)=@can={0x1d, r14}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002a40)="730491350dd926eb466c29ae955c8d9294eb6310dcdfad38313d", 0x1a}, {&(0x7f0000002a80)="7c08a1bf198f5edc28fb551f9bc0324eed82cdbac096f957ea9799a1f16203da42c7ba57dc524ab9fadefc3a6e4664abb803487cdf3987e473749fc444153ad0b1968cd0517ec2c3999375b9e9842a478b5cd25cf98c33b95d901b1ce2541d1b1230f3b98023b340669db3eda37d0d49d57c1e437047d671391c67f0b70b030cd1c18efec9138d2e6a5f0757a741d48b2143d0509a3b8dc49e1c3a4ab7d806239505ff6a233a699ef434845ca0fec3cdab272a9986806fcc35b0e81e053fdc43df818022acde23af8fa3bae4ae1df881fa2868dcc217f846a8e74271b1850f9db0362d98552d4980aa4d4bebfed7d827889b6e56552c2a549fd4f6dcd1028b", 0xff}, {&(0x7f0000002b80)="4b16a4f18c251d722071f031de67b434cc67874436128150faa3d9f48c1a89ef23c4e396b0d202368214d1ce2b83dc81e5fafcd40a94e94744b915a08251ad6293abfa3375c9837c5309ca45c0fbe16117e2bbd70e", 0x55}, {&(0x7f0000002c00)="c4ff62cacaae201cba08096d34bcf0044e16cc2a20d75cf725794f1e2a5613c15d886d337eb44f4d861421a4b02b4026d7f5b774668572cc3fe88249e2d17acae7e2951136b1bac940f30faa69ee047d573166edce36592e4090442f8f3dde67f0382ea3ee0a06543001c424b127d7137157182a22b7e785137c2a0d95f75a3585c66904d06a68dd1ee9d0007cf64b2591f65738a5b76231c82159d38478687489b7445bf5d85178eceb3dc5dbdce9a5ddaca964b2804a0745fdb66862daa01104b0766c0e500c8ac3c41262da049d234829a4b84ad94a935934a5", 0xdb}], 0x4}}, {{0x0, 0x0, &(0x7f0000002fc0)=[{&(0x7f0000002d40)="da02bcb7faf7f4e98b31e1e3bad58eb1e3c436dfdf3ff77e0f0b105476bcae901d48453c04832031721ab3363a89fa60bf9418b731edd77b9f03c41f548aa63f79cf04629f174f01cc9ad724340ffcccced1df36b798ca664ea888239fe0ea1c0af144181bfe9d9067440d7b65f083d167bf59c10e8d2539804264c77e1f9a39858409e0664ce7c0b4f870f6da915494b53cedc3862598a1499a96eb433f0429631b36f4787683dd8fb83cff57618c2c083e8ff2ad382db9255ec41b12856f48ce5e5b3abd", 0xc5}, {&(0x7f0000002e40)="5cc37279adecd12ab50729a0ff7b12726cac91108dd1c3e3eb86a89102cb2af1dcd917f27d5af5b2cd6eee0879746785dc0ba982ecdf95f9aeb355fb0f772bae61ee6f9f76bf97ea9db32a4452684d4a16b58681b8b0b15fb36eaac9342b569c709b302dc6972e9ec2fbaff970d1eaa775a92c3587352dd4544cafa2a754b2bb124fd5c755d69e770ea553e0e485114bd5d62ec16c79c9126d50238c984a44c499c3710c9ff2e9b561caed267932e158687584405729f0e69c316e79dec9952fa6b4ff54cccd366664a55c65d88bc636dfde4e83b73819c2c733f03d110c39b945f9c5d6121b34bb9ec9a1a8", 0xec}, {&(0x7f0000002f40)="06277189b6c93f44213e3eef4abbed2b3d648e4dc89869b6d6359d94b468fdf1e01ceb0050e09d24ffcda31130f52f7dd6961dd36824ff29db0d0e3d9017164755fe71d1712702215eb69ed856e6975e38865901f5a77dd5ed32536ab82c", 0x5e}], 0x3, &(0x7f0000003000)}}, {{0x0, 0x0, &(0x7f0000003440)=[{&(0x7f0000003040)}, {&(0x7f0000003080)="938b7bbd3e538a10f2926f26955c5bc365eff5d07a280c04d376d03ecb48a40bd04bbc843395fd0a4fadc958cf5ed28d9f25fa35018857aa06794973429c797acb5c4dd7d86f", 0x46}, {&(0x7f0000003100)="bae896fa2aacd6a33002cc8fc853cfaa17e7c94e8307fda606f1a99a6353721bacbeca528aaf7bb4e99f66b64435326bd353df720caf366907fc7c278d92d0b7038293b305e793a669a7d5db728861ce1c65b6fd373eade2e1bca75d48c64b34edeea74d11abe19700fed7e127ab80c856cce833a33c5b3e7dfb004fbea5d98ce1dbe23531da3bbb6798558ed1c6712c0817a828288cf74402b6079bf3d60d3b7129d2b42f299d4691868e145083964a74137a17c5a44b", 0xb7}, {&(0x7f00000031c0)="19c8c4f548f46014c4e52b2ce36f348af7d0b1bf37a1032041ea7848e26cf7f2c1fb6b05e61bc5f3", 0x28}, {&(0x7f0000003200)="1613f9d9c430ebb97108b4d199a8eec90c85e39a357161b0ea461aa6ef090a2c392ca40faeb525238653033972994859de1b816c652e222b39efffd7de7ff8ed4602ad9f77c29442d9fd9e5033f3f826dffc2a5690f3197156840733292a7dea1b548949eb818e736369fe786ffb5cc57338b63301f1199f0c4bd3dbbc", 0x7d}, {&(0x7f0000003280)="99099a085bef88b6b13bcf7544189734addd4f10dec76d11cd607f1d22991e9907e2b7a45686c7869e8327109814fcf7f90d2bf878a48f4716c036031b32dce4c65699edc36e65a11a4897f23b6817d56d688c904d74ba51b512e4130d7c31edfb41df42f7250ba8e0e1494541b2e9e5f8d0f59f29ba74a648dd0b0a271f6ac685561ffc0f0808506a77b88cecf64c9234b4eb4fbf5c8f2340ca09a979167edbfb60f09bc70d0be632d1adf2baf080e672cc", 0xb2}, {&(0x7f0000003340)="ed09b03378e6736007f6a31d440a763ddf572f2f0c65d016a9c79df8164e6923aa57924d29aa68a90352cab47f21258c927c701c5dfe51a66bc6f764e6b0d721c4f12bf01a23e70f6a26089b1669b9ff91ba6d6eb663bba50bdca8af3f0f8bb2f653dc28cce78e3f97a347af62c6ef77950ca2433933d3fc94a6cdcf70eab3207e145a575687aaa34c19e48ba076d3cd541717a8e4dc9bba186a1b91a937569420b72ced4e368699897ac2b705688b682e9b66d27d69b0fc40206e4939bfdb4347e4b0826dc3242776e4c321b4", 0xcd}], 0x7}}, {{&(0x7f00000034c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x80, &(0x7f00000035c0)=[{&(0x7f0000003540)="48f6bec959d603aafcdf5da5e8e15ea026762f7b4571ded4ad13ba8b3e1c2490dc232689ef18b48fd2012f2731c2b7a01badcae10042179d9ec9e8d57b06b44a803f858a3bfd37384b5c164bd159fb4a", 0x50}], 0x1, &(0x7f0000003600)=[{0x1010, 0x6, 0x28, "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"}], 0x1010}}, {{&(0x7f0000004680)=@xdp={0x2c, 0x1, r16, 0x8a5}, 0x80, &(0x7f0000004700), 0x0, &(0x7f0000004740)=[{0x1010, 0x10d, 0xff, "0005c2383ebe730ac80008efa94a4ec14aa71ebb8c2c6ae57b46a5df280c2a4b1e76b55d196e493c56baa238db28323fae93b9a39c903cf81b9ee52024139596d1737487dfb2670919997aad0c5948f029209c677c4e3f1765ecc4e0f340b2b44831052ac5f09c99a53e0a66c87415039b386e6aa37a89c1e33d6b311d38f2e10334e77a19608b5f16cac6e0d988e451aff99e94adf75523864944bcd37f3db9071cada899b98d9b70ef1a16cb1c82b213ba6ad9afd3f46b640dea3cf1ef5e16a9afe7ca887e14b44c0d9204aba679942dc05c60692d2f606fca68458b9393117bfcc96cdf5220c3c98e779eb3a9a292097cbca033b10be28aeaebf1b213c739814bc7edd1cffe235b3dae2034daa094aa15c8cacb26bd273959a6d4de69c397421471f227daa52ba6b7b3210730625767f7e0e86e215246b360a460c87b2baf8fe8b658426fcb4d91fe3c1cb6a8a6c1d3cd46b81ff9d8bbddd9297b3dfdf89ae714386b439f6ee16fbddcb45ab0824a3a8d781f7595b687dc35c77c499a5a9607d090c3b107b4d955b0e83de8181a94b71d27ff4c9c1b1927584a884b4555e42f6eed3c7df509bce268d90b535465cd2924d3bfa20f2b17b5f91bb46846059120baf01a598f653d902c627be061fefe409c2024f07d05375154442b1f534b9d3f35dc431d8efbc230ad4ee4b7e63ad19732cfafbe06bb5d9971589019ed593a98098749cbd30e02c674227ba16878d69b9aafa55c13c20b533dad29aba617db3a447dcdc04f96bc4766cf406b41a21cb1f18b3bf8bb11ef148602a63d4decd2de2c8a3c8d15f9128bb73a1370977d3562c267943883c7596c7406fe8c9585a7c6950685779303a1bce5c8d2c68cbf424105d0c497ad84ea27159d04c085fba1c1efeb918dbfd20c417f6da2a57cd9092ac0742d53ed00d0783bd00c517eaeec082ba407b2b3a634b3a10556e294367e05ccd66a8abc0c6ea8a648cd4b0508aeff2f4e98b03fa8d155bf5fe3287e49a1c98f249394e351487afc5e80b3d3430232271739857cdd1c0218341db404a5fb97deca893b73b1810c74692163f4a041ed44da69694ca12b4cb48724ac9c9f6cf403e3361dc03f720fb0b1136a007f22858364372471c80e18e54159d0253a459b97a5e6faf0b00586b0ac5bd3ff521d197a5d6a8e187fdb7e8b24b64fe0dff64e9bccbeed99f884fd77a8ed2638d0ff8029af396336a722961b953bd92d2930bc8f60d1ab34bb3dfa63baa73b89240256b2f7f79f3dd92ba1db37a53522dd6298a1d75ab2e005856de6e0351dd02b69f1e018b69c1f3b91ceb55787b5f73f81ba4fe4c4008a6f840ddc1d4354da2e1d933d371a09f99e7c2b855aa27dce50423c784ec42e66c784061c3ca97e831551715a53d59b48bca7f962394698ce68fa205a2763d6a09604744ca0806309e8d469841a477f442f94eae680bc76c9c2c965c1037d78956456246868f06ab22ec026e51d3cc683fdcf9f722b917469ffbfbfa5a755b529a81a635c1061ac1bc37a7a77dbc375f6b2e0b2d59463420dd0ea4fe82a1c714976194cd71b3ea3a91b77ffd6e49891fb9cbef81ff24a559f0e6c9930cf0b4d2541fa5f444541e1f1086475395c212141f003a3caa326e9dda6d5f3e2eef0b3b02cedb1a48275f221f4bc8e23de656facf2903da8f951cc9b068d2b5974503a6379a706d5b4e41c3b9e0617c0d45b58042b2b69d6aee3d0141d70226402cfc88ee3c591c9891b28787011322809dc830073080474bfe125588d3f11e587a6c39c1834e2c96f8ac446ba7026c462d9177dd449a579a282149988eda040efa5038bb2d83a32b3cbc27e77c2f8b459b3bc2066b915844c916eb453f84f4a78b11f17cb77ccfdf2df65b86c32e6d6df2cd19245aa32987ac46552165a58440116362777be541cf7f858e24fbe2f2a5294691274c3cdd4fbc8db4315107be30d0258d06eab6faa325d4bd4c194effe67f37d15345adfa19d15661b36a4fb1a205711d24777b3502576253bfbbf50514d7c09328cab79d65ad255d21843575ae1cbfe6830f007e695208a9d9a87b7da92d887e18610c39c118d11466b5a9577927f901341268e247dea6df41674231a5ba10ca1ba84a1c86ebf3e06da09b20a82bcbc8986e0efe4a9dcb251c17f202a9c24c6fe2ee7e93951258204c874bf0a8963638601e226c2bdf75d43b61c2bd75bf89ea107de5d95d5319a12c0b33a4778881a83a56dd6512ecb158405c552a32014fadbbec4da05448badcdb28c8d0e3ab6cc6896b9f6d318ddcd4d2680df738b805a66bb62a4d4d96dc11babb57f33a7ca29cd69992b36c4667b09033bf5981fd38556a00e1e9a3ca7c74a93803a96531c1d252f97b7f0034a312a95b11bd6de954dc3b2fa4d48b36783f6264ba87a6ebec67f4cd8829515fe7b714a171a3cf373c79b27290ffa30eabf980934b787e6dffec9dce65408ddf27e1aaae194f298b3c18117e5f0314a66c813ca0a56120a0f52398f6b29233d61e133c2692c906ff268af19c488e8367678b8deedd9957bd6883fa634bd9d1e6d60200adf349366e1678fb26bb9d5a58d0c7ab3d8802da62387816799a7e7b1fda90a23f2db4423fc898d8ca9e195335323a2c417abda49e3b11310a18e4a9009d1673dd851efe75133a1b23c3399562d76563bc6c1ce188f0b0c3ef69457a09ceb39dda469d9e764eb90877e1e78c7331bcf0153856d4a3eeb51ce6c0b1179a15f337c7a571ac325ae62d0612f31b4689c4884eef51dec14bdc582071644400c4ad2b45575fa0ed8d03b421aad7e5df0429081c5fb273e4c44364796d341577cbf812df8321e7a63f43323bc87f21d440eb4bea6fcb549aa8508f9cb3516a870a2c4d21a5ca38f1342dee4084184f69333f97719c30e5c6e5a999f21aa1d08c013123f96c76b6e02b80e4f69d0ce2b30b4cc7ba057c613f6f5a8b5408f36bf138223eed7f2dcceb3c54106086116a7ef038413d6fc5e00e0850f6d7b8e8b72e5a4e522e44247ff10e2dffbfadadf6f130d9adbfde3db524ad73584d8fef191b3702d72669e1dc7b63013ea9c8c69893aaeabed18ece26101e890fd5dd04c43ddb7219454f6a582441aaa16a872509c266e12c0098892d0908d451cc734480f82b6c3c96461819d477b782726dcf0b10227f58733891cc438a639d46d5071e4d9f946cb765d1afbc3a2e44465300fe91fc65302688f853b978924cadaac8b3d4f6ea465da7cda4b976e38024613e97e2c66c90f7a95cb6255928eb7669d568371047e119155b781240981c3ae1cdb08c8591c46f71dae4b6ccb94f4a471aec1a94a5ead0f92f07ad4780d8ea672da9d88264c2e45e9fdeb20ec55ad2f2c9f778822c6ed3f676c5069909fd3f664c401ea9e83d2fb7abd1d874f8813b898f94dd033187a10904abcb9da89a03daea47e9e2e2406f29345404e3898ad92843d673245d29ec95c10deeb8e7439dff304a067807b393f2f408934572b4ba5f303596e8eacea11f970e304323f8150618a7586d8f18a8b327911a953b96fbb7e7c8c9c3b059af10c7080b0c82db8f3e618a400a8fb9a51e4a859e71571515077aab1495243ce598253abeafa5a86fa0c60f3da98f2925bf769ef085cf03f198a53f5c8ff1a1f8475a4a33390d4a864e4fb47c50185430cb89403c65a501897f07457c849861579169812409fef507c968ff2cf5e0904a9c4dc9a00dd71d8c3bc1b4a404cf9678ae978102dffd05eefb42233ab8199dfb14ec4daaa0230c17e146d8414fdde1a9a67e8c0d6969ff2e487c329019daeb8d1d7a440b2628fca30746eb701c11dfbf8cf62f906903ea10ea82b2d6bb758a99b275cf064fafcf0c86a66e9454da2607b862e506b1353262684621667086aa9ceec4bbabb39b6188041f23ee6b34b5829a8fa3042bd3e56fc2407b73b48281d86d46e726840c68b893f2af55c213d4f91f766ec73912b1ac4a013d11f5b134d56ec52e3382f1721ba421be3aa9d6257f4dd95b06a8183171b0a3b551dbe874ea8a03adc496d6542f8d5c9d4400bcdfba126b357a6aa9fb649a6da931d1b4befa5fe51309c646ac9fd07d4df6074c4e381840f730938dfb7ebad3a47b1095b74fc554bcea2bcb637fb4537943729932b3569d0e8e42cc6dfdd591c36de3144d53849b2558b6a8a446492486d74604bbe4bc25278b9bff0353d0a12f6de4def62e5f5ba83e55c3d6eceae1fb45031a498100877c68103cef2558c6b5088c9209eda38a4b6a0f4270bbe20d2334a7f837a3a18a9059545d9f4c624c0906c0ab93deb6ee94969da6ad0da398c3afc0ee7f17a96b25901dd7aa57e8ee09175d75a7c7fd2809b449fddd00dc7fa825fcc462546c6d0561578b0678245b8a1bb9b27ed8a6dee3e0324f03f959897d8912258785b1921eaa576265829117ac97d3ca61fe0497f9a6c18fcf02df35823e661e9a571f8aa3b2bf6ea64d55dfbae77530720dbea7318d0f978f9423fa30246cb29dfe9a0f97e5e77641a1cf78dfd96bd6c9fe3c96d964335445dcf51b0e57f6547bdebd15bf2f47abb07dbf38418cb7d65f583275d52552a98b4f258555243d7b47a4b5e06e882b6ba2c23f0e1ca36e91056e7d4e322c9b1c54d07c3117f4e66e4bb05c3f87a4c40e60b938249d4d0f9375452de595c6825100a6834dcc1528906b20c4e68f0d9a77b79780667f7f155b78218d6871754fdce420fe47725df1838d603ad22ebae97c5045570de618bc975141292818b90cc9131a975849e5506f45095849e30fb427aed649d50d220b940df4cca8b8a2a6b01af975306d6ebba8c37164736f32c9832c09141c4787ff9ae4091c4dce26b4217a5a7f140a54bd9aafbfd709bde99531094037e94c0c0cd1ad180237d42ebc3ba5defe5ccce0963b90ec697211341e3ec8d04aae4ce00cb54ecbc3d01f8575e44b80eafd3e58c9061e779939b668b35e283612ca0065c9e4bb1d0962ca9a438eeb6725a8519f3c91446bfb7bdc74f8f90a2a624f9efb1923b1c04b71884e5d6844a9edbefbd351bb78317a457121c595a4e157b2bbb0f42ececa8c7d14d4c1716492797bab72896eec88b909d091b23f023cf7b3500efffb6130ea863c3e0d5a3832427a328e10e44b02dbc9817d16ac058566a06f1a90e44dfbf7ece070b66125526f0d84de107aaba76ff248c67a510803d78e57cae46370b0996e27a920a683f878bc42444c51ef507611bf15b1baa9aeb5f92fc4173c73468ecaf9f028a92a62d9a5625e3194675eaa10d23b9111ce36f6aaf4a0aaf82995746328e2b3dd319815ccdca2fea70c5e566782cee41c31a16095d4a3893b03cd2edab6b5f042f25c2042fe6d2857e3552ca158b2009520aad00581bd76069f80f2c4d01fc93ec60f356097854f85027ed60aa0cffa1dd5f3e23f3bb3b9a103bab74f7ad3db40d4da76ace6e92c4bc374aaeb0530406443a3a0962f0a139ecd59d6eb266bae070f7e7e1fb8366d3babbd60722b003c7e136066efb74211963968e8618003ce174298d322c587bb0c1512d276fa8af87df8a5b8ee7c9a3988ac391fe16788a36e82065b59ec494e71c3ab92c829012570fbdaf66ed4fedb9da318888edabbded4c540f6ffee80335c35cb9071dabe17d77f6447d6d76df23f89240762c388ebbc1b43675419b0496e699e08d395e265efd645b46d44dc4de2a028ac249e36f06e76a0b57afa824e28eaead6dcb44bf709833a357c5efb4ec57ff58d00d014fda6742f07ace617e916e2f8f"}], 0x1010}}, {{&(0x7f0000005780)=@ax25={{0x3, @default, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default]}, 0x80, &(0x7f0000005ac0)=[{&(0x7f0000005800)="4c9c8289ce46da82e220386e7947712a0dde768dce7757548bf2bcb794bf2356b9b67fac8c5b3501f54b82171ce0d1ac16a2efbf72ee8c088687118012f62c318fd99c7a3be6993559973089a4b8ee3c9a679c6918ff75bbbfc6d1072215450f60916115532e07329c7b5ab89c9ab58dc44afa2be31df06266b5db34e5538ece", 0x80}, {&(0x7f0000005880)="07ed209fbf157e45a3be1561a8f6471583db870e2811f3d29ee71ccb4e7d8ade6f92640393de9f3cff2c1bf2efe13ba1f02fc308cc698f9d85f0206a1812e3d33164a5b3a5ff19a0d2ca9e53f11beb17f79a5d0ccdcf5217c6cef97da809fa6242a166f3c6126bbdd6ac", 0x6a}, {&(0x7f0000005900)="10012bc675c1bf6cccb802a34dd8a254f4b46fcb73dd1c47422f5d70f66b5c4013fcd9547679b13a871245fa73a82d43b08b14c857e403785edefd6ab7ecdafbb622ae8ed8da5c3295e2ac756d255926a567cadd1f1cfb8ba964e750a306b267cba01447ee3293d6e967e4d7f472278101579fe718c8527ac104000b118506e7484d66fe830694c2120d734199971e1c607e05d03305cdf32a47ece2a2e1c7b0e7c1c8f88d0521dba189a7d2d6eb6edc58b89943aa4a2fbdaff17e2e2ccee66ee7084d6f6da9dd8ecac6c0a1b5cae086d7fe765a1cb2531a", 0xd8}, {&(0x7f0000005a00)="4debdd6f57d2ec145bba515171924c6db042c9865626df48d1feb808ee4b46485b443b6f5ccb028ca2b8cd9f8182d41ff44ced3ac96ef79a0c54af20e5caca1c5ee9222566321eb7f98dbdc1", 0x4c}, {&(0x7f0000005a80)="9a69c7a5148123a2ab86c242be71aa1f45e8523898e230088b6c9864e55253c620ede4854e598c25523e", 0x2a}], 0x5, &(0x7f0000007040)=ANY=[@ANYBLOB="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"], 0x12d0}}], 0x8, 0x8000) 04:29:50 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:50 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2452.893117][ T8590] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2454.482346][ C1] net_ratelimit: 5514 callbacks suppressed [ 2454.482360][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2454.502649][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2454.515102][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2454.527492][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2454.539982][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2454.552456][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2454.565497][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2454.578432][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2454.592622][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2454.604920][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:29:53 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:53 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000003039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:29:53 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:53 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) recvfrom$unix(r4, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x200, 0x4, 0x1, 'queue0\x00', 0x6}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup3(r6, r5, 0x0) recvfrom$unix(r7, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x48, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x34, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @local}, @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r11}], @IFLA_GRE_REMOTE={0x14, 0x7, @ipv4={[], [], @remote}}]}}}]}, 0x68}}, 0x0) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r12, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) r13 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x8840, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=@deltclass={0xa8, 0x29, 0x90, 0x70bd29, 0x25dfdbfc, {0x0, r11, {0x0, 0xd}, {0xb, 0x658e5c46dee0a3e4}, {0xc9451a4ee0ca957, 0x3}}, [@tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x4c, 0x2, [@TCA_ATM_FD={0x8, 0x1, r12}, @TCA_ATM_FD={0x8, 0x1, r1}, @TCA_ATM_FD={0x8, 0x1, r13}, @TCA_ATM_HDR={0x20, 0x3, "18ad3eb4e63127aa439c105f771eebfc955f992c26f2d79c537216"}, @TCA_ATM_EXCESS={0x8, 0x4, {0xffff, 0x1}}, @TCA_ATM_EXCESS={0x8, 0x4, {0x4, 0xf904be86b1add83}}]}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x28, 0x2, [@TCA_HTB_RATE64={0xc, 0x6, 0x7}, @TCA_HTB_CEIL64={0xc, 0x7, 0x80}, @TCA_HTB_CEIL64={0xc, 0x7, 0xf9ee}]}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r14 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4000, 0x0) setsockopt$ALG_SET_KEY(r14, 0x117, 0x1, &(0x7f0000412ff8)="fa018e3bffffffff", 0xffffff27) r15 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r15, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r15, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/138, 0x8a}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:53 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2455.609849][ T8734] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:53 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:53 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:53 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:53 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2456.010005][ T8927] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:53 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000005039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:29:53 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2456.354897][ T8955] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:56 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:56 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:56 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:56 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000006039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:29:56 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x1fd0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) [ 2458.765072][ T8971] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:56 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:56 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:56 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2459.049487][ T9127] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:29:56 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:29:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_map={0xd}}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x8000, 0x5, 0xfffffffffffffffa}) r4 = fcntl$getown(r3, 0x9) fcntl$setownex(r2, 0xf, &(0x7f0000000000)={0x2, r4}) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[]}}, 0x8000051) recvmsg(0xffffffffffffffff, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:56 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2459.316012][ T9220] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2459.492665][ C1] net_ratelimit: 4982 callbacks suppressed [ 2459.492679][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2459.510955][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2459.523392][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2459.545614][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2459.558047][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2459.570559][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2459.583855][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2459.598265][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2459.610668][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2459.623038][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:29:59 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:59 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:29:59 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:29:59 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:29:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:29:59 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r3, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2462.359560][ T9314] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:00 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:00 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d000000000000a039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:30:00 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2462.631245][ T9429] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:00 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:00 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2462.867707][ T9438] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:00 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2464.502011][ C1] net_ratelimit: 6794 callbacks suppressed [ 2464.502022][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2464.520251][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2464.532502][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2464.544935][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2464.557228][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2464.569701][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2464.582426][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2464.596511][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2464.608796][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2464.621166][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:03 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:03 executing program 2: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:30:03 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:03 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r3, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:03 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2465.842753][ T9658] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:03 executing program 2: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:03 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:03 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:03 executing program 2: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) [ 2466.118743][ T9667] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:03 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:03 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2466.362916][ T9693] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:06 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:06 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:06 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:06 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT], @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee501000000353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0x3}}, 0x8000051) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) recvfrom$unix(r5, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x6}) recvmsg(r2, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:30:06 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r3, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:06 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2469.182797][ T9795] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:06 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:06 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:06 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:07 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:07 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80000000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) umount2(&(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) [ 2469.461635][ T9919] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2469.511471][ C1] net_ratelimit: 6759 callbacks suppressed [ 2469.511484][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2469.529743][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2469.542293][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2469.554917][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2469.567454][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2469.580034][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2469.593456][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:07 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2469.607655][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2469.620229][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2469.632736][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:07 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:07 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:07 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:07 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2469.861326][T10230] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:07 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:07 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffe0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000840)={&(0x7f0000000380)=@in={0x2, 0x4e24, @dev={0xac, 0x9}}, 0x80, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0, 0x0, 0x2}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="857069647320"], 0xa00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x26e1, 0x0) 04:30:07 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:07 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000013039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:30:07 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:07 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:07 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2470.193675][T10257] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc}]}]}, 0x24}}, 0x0) 04:30:07 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:07 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:07 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:08 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2470.537700][T10372] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:10 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:10 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:10 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:10 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:10 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000022c0)={0x14, 0x5, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) [ 2473.401072][T10485] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:11 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:11 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:11 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @rand_addr, @dev}, 0xa4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000140)={0x21, 0x5, 0x17, 0xf, 0x0, 0x10001, 0x0, 0xf0}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044014}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2473.604795][T10601] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:11 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:11 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2474.522062][ C1] net_ratelimit: 5772 callbacks suppressed [ 2474.522076][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2474.540386][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2474.552863][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2474.565366][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2474.577804][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2474.591004][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2474.604391][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2474.618709][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2474.631136][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2474.643547][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:14 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:14 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:14 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:14 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040), 0x4) 04:30:14 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2476.793200][T10725] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:14 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:14 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:14 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:14 executing program 1: io_setup(0x0, &(0x7f00000000c0)=0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) io_destroy(r0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:30:14 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:14 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2477.119751][T10745] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2479.531612][ C1] net_ratelimit: 7597 callbacks suppressed [ 2479.531622][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2479.550888][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2479.564332][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2479.576773][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2479.589076][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2479.601594][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2479.613908][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2479.626519][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2479.639332][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2479.653549][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) 04:30:17 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:17 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:17 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x100, 0x40) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x821, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6e73}, 0x0, 0x0, r0, 0x11) dup(0xffffffffffffffff) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) pipe(&(0x7f0000000180)) r1 = open(&(0x7f0000000000)='./bus\x00', 0x4000000000141042, 0x0) write(r1, &(0x7f0000000200)='8', 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) setresuid(0x0, 0x0, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000004c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setreuid(r5, 0x0) lstat(&(0x7f00000000c0)='.\x00', 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x400, &(0x7f0000000540)=ANY=[@ANYBLOB="9d183d6ae748bcb76215fbd85f6bde4541d98a3047e1930a30f04240a85b5e3ce204a5cf08cfea01c100dc70062f6688dadfef39aaf902d37f27d8583380e6267719006f0100", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',max_read=0x0000000000000a9f,uid<', @ANYRESDEC=r7, @ANYBLOB=',\x00']) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="b0020000000000000100000000000000050000000000000001000000000000000600000000000000f8ffffffffffffff0000000001000000000000000000000009000000000000000300000000000000ff7f0000000000009c00000000000000420c00000000000000000000f3000000060000000200000009000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="0200000093060000000000000300000000000000fdffffffffffffff00000000ff03000006000000000000000200000000000000ff03000000000000190000000000000000000000ff070000040000000000000004000000000000000600000000000000ffffffff00000000d506000000000000008000000000000000000000026b0000010000000000fffffc000000", @ANYRES32, @ANYRES32, @ANYBLOB="0100000003000000000000000400000000000000ffff0000000000000d0000007100000073656c696e7578656d313a235d00000001000000000000000300000000000000020000000000000000010000000000000000000003000000000000000000000005000000000000000400000000000000050000000000000000000080000000000004000000000000ff0f000003000000ffffff7f0002000009000000", @ANYRES32, @ANYRES32, @ANYRES32=r4, @ANYRES32, @ANYBLOB="ff7f000006000000000000000000000000000000060000000000000011000000060000006e65742f6669625f74726965737461740000000000000000"], 0x208) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x7a1b71c4c013da3e, 0x2, {0x0, 0xff, 0xff, 0x6, 0x2, 0x1, {0x3, 0x4197, 0x1000, 0x4, 0x20, 0xe51, 0x8, 0x81, 0x5, 0xca2, 0x1, r3, 0x0, 0x10000}}}, 0x90) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket(0x1b, 0x80000, 0xf9) connect$inet(r8, &(0x7f00000000c0)={0x2, 0x0, @local}, 0xffffffffffffff44) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) sendto(0xffffffffffffffff, &(0x7f00000001c0)="c12aa917437d9b56a25200dcac9bb3230b985d0dac138952f8d816", 0x1b, 0x0, &(0x7f00000002c0)=@l2={0x1f, 0x8, {0x0, 0x80000000}, 0x0, 0x8001}, 0x80) connect$inet(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet(0x10, 0x3, 0x0) sendmsg(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x3b9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r9, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:30:17 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:17 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2480.104501][T10861] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:17 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:17 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:17 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:17 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:17 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000001c0)={@remote}, 0x14) 04:30:18 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2480.433137][T10980] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:18 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:18 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:18 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:18 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:18 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:18 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 2480.995223][T11096] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:18 executing program 4: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:18 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:18 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:18 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2481.247978][T11193] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:18 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:18 executing program 1: socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40000) r0 = syz_open_procfs(0x0, &(0x7f0000000940)='sched\x00') write$cgroup_subtree(r0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000a40)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000980300000000000000000000000000001801000048020000040300000403000004030000040300000403000004000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000001f00000008000000000000000200000007000000080000000200000006000000ff07000000020000090000000000000000010000070000000900000008090000ac1e0101ac1414bbff000000ff00000076657468305f746f5f626f6e6400000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000eb00004000000000000000000000000000000c01300100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000b00000002000000020000002400737461746500000000000000000000000000000000000000000000000000f3040000240052454a45435400000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800bc00000000000000000000000000000000000000000000000000240052454a45435400000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000fefffffff4b27df54a1a4b8eae65b2613a2cf5a83ae40566d986689d2da007ae7f0147a240015feae253e8fd38056d9a8ca6c936384db87d406072f6c3b3b946295e6409a679e29635608beb371076ea53a18e75f63a20180a73fe957a1d27995d55d44ea2064f6386e3637db65944938472adda976989da7d5fe82de24f4dadbbd30f3cdb7da7f14d075ec746cb444ef7c50c62b62ddfec8a91d28f13be3faf6c4a0edeb0559dd4cbc2a404b68b17fbfae211f23b657d18ac79b1bbc5baed77a9200547fd31935851b77c62c4e0223426f98f547356c77e71b567b5863a5eaa0c0c7cf4fc27ebaefe6a13379a456a9aa142629154dea18d77c13ab9296cab75df19c851b3bf43f67a38c828bf5729561aa2b1027a8592c05368205fe3737a25a4ee4a1566b377742b8085b6c58ac5840f77b702505aa57661b9711174cbfe28550985f0cd9c6de3e12374584dddea2c01a0bd182a63b2ca99dd284651f554ae7cd539d7da82afaa9c62f958de00e9b7e04df9482e726db38f8c27a5d57496fcd80ee0188bfcc6602bd0"], 0x3f4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r5 = dup(r4) ftruncate(0xffffffffffffffff, 0xee72) sendfile(r5, 0xffffffffffffffff, 0x0, 0x8000fffffffe) fanotify_mark(r1, 0x51, 0x10, r3, 0x0) getsockopt$inet_mreq(r3, 0x0, 0x24, &(0x7f0000000040)={@rand_addr, @loopback}, &(0x7f0000000080)=0x8) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x14, &(0x7f0000000000)) ptrace(0x10, r7) ptrace$cont(0x1b, r7, 0x0, 0x183) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(r9, 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) stat(&(0x7f0000000200)='./bus\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getegid() setresgid(0x0, r12, 0x0) fchown(r10, r11, r12) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r14, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r15, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0xe, 'red\x00'}, {0x4}}]}, 0x30}}, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000023c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r16, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r18, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0xe, 'red\x00'}, {0x4}}]}, 0x30}}, 0x0) lstat(&(0x7f0000002440)='./file0\x00', &(0x7f0000002480)) 04:30:19 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:19 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d00000000000b8039815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:30:19 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:19 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:19 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @rand_addr="7795eeae71890bd2f5fa643a75a8c8f0"}}}, 0x88) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 2481.783979][T11432] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:19 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:19 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:19 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) [ 2481.982930][T11525] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:19 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:19 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:19 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2482.238368][T11564] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:20 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:20 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:20 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2484.542363][ C1] net_ratelimit: 5263 callbacks suppressed [ 2484.542372][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2484.560621][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2484.572972][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2484.585487][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2484.597919][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2484.610461][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2484.623332][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2484.637407][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2484.649672][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2484.662077][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:22 executing program 4: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:22 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000a700)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000001200)="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", 0xb90}], 0x1}}], 0x1, 0x0) r2 = dup(r1) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 04:30:22 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:22 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:22 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2484.832817][T11589] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:22 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:22 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:22 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:22 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:22 executing program 1: 04:30:22 executing program 4: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) [ 2485.032360][T11702] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:22 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:22 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:22 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:22 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:22 executing program 1: [ 2485.304065][T11716] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:22 executing program 4: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:22 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:23 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:23 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:23 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:23 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2485.575474][T11733] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:23 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@remote}, 0x14) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) 04:30:23 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:23 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:23 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2485.798984][T11746] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 04:30:23 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:23 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2485.885637][T11770] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:23 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:23 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2486.100095][T11869] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:26 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80000000000003, 0x3) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={'bridge0\x00\x00z\x00\x00\x00\xff\xff\xfd', &(0x7f0000000100)=@ethtool_ringparam={0x11, 0x0, 0x2, 0x0, 0x48}}) 04:30:26 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:26 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:26 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000129815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:30:26 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2488.622522][T11889] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:26 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:26 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:26 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:26 executing program 1: unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/ipc\x00') 04:30:26 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2488.851220][T11999] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:26 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:27 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:27 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) read$FUSE(r4, &(0x7f0000002480), 0x2314432e) sendmmsg(r3, &(0x7f0000005b40)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000780)=[{0x0}], 0x1}}], 0x2, 0x0) 04:30:27 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:27 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:27 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2489.503902][T12118] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:27 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2489.552432][ C1] net_ratelimit: 5538 callbacks suppressed [ 2489.552446][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2489.570765][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2489.583362][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2489.595883][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2489.609230][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2489.621977][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2489.634469][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2489.647022][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2489.660531][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:27 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:27 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:27 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2489.710542][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:27 executing program 1: [ 2489.859778][T12238] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:27 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:30 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:30 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:30 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:30 executing program 1: 04:30:30 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:30 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:30 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2492.747927][T12260] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:30 executing program 1: 04:30:30 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:30 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:30 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:30 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2493.056389][T12277] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2494.561629][ C1] net_ratelimit: 7227 callbacks suppressed [ 2494.561642][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2494.579934][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2494.592222][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2494.605361][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2494.617704][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2494.630059][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2494.642341][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2494.655450][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2494.668777][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2494.681070][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:33 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:33 executing program 1: 04:30:33 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:33 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:33 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000059815fa2c1ec28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:30:33 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:33 executing program 1: [ 2495.826709][T12293] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:33 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:33 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:33 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:33 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:33 executing program 1: [ 2496.063739][T12303] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:36 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:36 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:36 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:36 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:36 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:36 executing program 1: 04:30:36 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2498.889318][T12323] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:36 executing program 1: 04:30:36 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:36 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:36 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:36 executing program 1: 04:30:36 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:36 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2499.280479][T12347] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:36 executing program 1: 04:30:36 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:36 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:36 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2499.537900][T12363] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2499.606712][ C1] net_ratelimit: 6899 callbacks suppressed [ 2499.606725][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2499.625969][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2499.640161][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2499.652565][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2499.665082][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2499.677487][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2499.690759][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2499.703276][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2499.715740][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2499.728302][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:37 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:37 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:37 executing program 1: 04:30:37 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:37 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:37 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:37 executing program 1: 04:30:37 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2499.966537][T12378] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:37 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:37 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:37 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:37 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2500.257998][T12398] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:38 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x39f) quotactl(0x201080000100, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x1000) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xa) fcntl$getflags(r0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000006300), 0x0, 0x0) 04:30:38 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:38 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:38 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:38 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2500.891309][T12414] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:38 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:38 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:38 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) 04:30:38 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2501.137622][T12529] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:38 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:38 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2501.386113][T12643] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:41 executing program 5: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:41 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x400000000000058, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x0, 0x0}, 0xffffffffffffff52) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80000000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) umount2(&(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) 04:30:41 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:41 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:41 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2503.966124][T12651] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:41 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:41 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:41 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:41 executing program 5: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) [ 2504.138738][T12720] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept(r0, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000c1862bb46398ef1001400010058988af315f07001c3142bf2b9216f80a7ec467d96060cd9e61bd464d59430d75753f633ca7c637a9ba634d7444fc5736531c80f7e1f651feee5b1a8b74b353ee39542b0b98610ceed274014b56b072ea4e9905a6744"], 0xfffffd33}}, 0x8000051) recvmsg(r1, &(0x7f000000b680)={0x0, 0x231, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x7fffeffb}], 0x2, 0x0, 0x0, 0x7}, 0x0) 04:30:41 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:41 executing program 5: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:30:41 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2504.390056][T12782] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:42 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2504.611482][ C1] net_ratelimit: 5791 callbacks suppressed [ 2504.611493][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2504.630647][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2504.643172][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:42 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2504.655592][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2504.714828][T12798] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:42 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:42 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2504.984119][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2504.997542][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2505.011873][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2505.024262][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2505.036767][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2505.049180][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:44 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:44 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:44 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:44 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:44 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x400000000000058, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x0, 0x0}, 0xffffffffffffff52) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x80000000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) umount2(&(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) 04:30:44 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2507.327785][T12924] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:44 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:45 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:45 executing program 1: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2507.568533][T13036] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:45 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2507.669307][T13044] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 2507.735807][T13048] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2509.622130][ C1] net_ratelimit: 7133 callbacks suppressed [ 2509.622140][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.640300][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.652791][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2509.665202][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.678035][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.690512][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.702768][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.715246][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.727989][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.742020][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:47 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:47 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:47 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:47 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c5ac28656aaa79bb94b46fe0c0000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:30:47 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:47 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2510.427440][T13058] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:48 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2510.653448][T13073] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:48 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:48 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2510.883582][T13080] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2510.996847][T13086] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:51 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:51 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:51 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:51 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:51 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:51 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2513.621868][T13098] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:51 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2513.739169][T13107] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:51 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2513.868899][T13110] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:51 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2513.979915][T13113] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2514.100100][T13116] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:51 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2514.259748][T13119] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:51 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0600bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) [ 2514.631753][ C1] net_ratelimit: 7026 callbacks suppressed [ 2514.631766][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.650851][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.664477][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.676906][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.689277][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2514.701745][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.714561][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.727064][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.739285][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.751782][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:54 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:54 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:54 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:54 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:54 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2516.701170][T13129] validate_nla: 1 callbacks suppressed [ 2516.701177][T13129] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:54 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:54 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:54 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2516.986023][T13253] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:54 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:54 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2517.171365][T13361] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:55 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:55 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2517.597548][T13473] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2519.641910][ C1] net_ratelimit: 7205 callbacks suppressed [ 2519.641920][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.660203][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.672433][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.684894][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.697739][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.711812][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.724035][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.736469][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2519.748745][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.762084][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:30:57 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:57 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:57 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:57 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:57 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:57 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2519.838410][T13587] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:57 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:57 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:57 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2520.069417][T13760] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:57 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:57 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:57 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:57 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2520.279680][T13912] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:57 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2520.462563][T13979] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:58 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:58 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c1000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:30:58 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2520.711924][T14027] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:58 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c1100bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:30:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2520.884118][T14136] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:58 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:58 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:58 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:58 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:58 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:59 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:59 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:59 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:59 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2521.825164][T14428] validate_nla: 4 callbacks suppressed [ 2521.825246][T14428] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:59 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:30:59 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2522.020168][T14449] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:59 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:59 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2522.317221][T14511] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:30:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:30:59 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:00 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:00 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2522.546371][T14593] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:00 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:00 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:00 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2522.789847][T14605] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:00 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2522.935621][T14611] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:00 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:00 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:00 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:00 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:00 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2523.136772][T14619] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:00 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2523.372425][T14630] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:01 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:01 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:01 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2523.589735][T14637] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:01 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2523.716885][T14645] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:01 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:01 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:01 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:01 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:01 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:01 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0007bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:02 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:02 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:02 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:02 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2524.661634][ C1] net_ratelimit: 3519 callbacks suppressed [ 2524.661647][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2524.679932][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2524.692466][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:02 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2524.705753][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2524.719982][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2524.732390][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2524.744839][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2524.757228][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2524.770447][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2524.782933][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:02 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:02 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:02 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:02 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:02 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:02 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:02 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:03 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:03 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:03 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:03 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:03 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:03 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:03 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:03 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:03 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:03 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:03 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:03 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:04 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:04 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c2527bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:04 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:06 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:06 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:06 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:06 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:06 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2528.712679][T14765] validate_nla: 17 callbacks suppressed [ 2528.712689][T14765] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:06 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:06 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2528.903796][T14804] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:06 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:06 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:06 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0048bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:06 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) [ 2529.160890][T14883] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:06 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:06 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:06 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2529.370595][T14995] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:07 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:07 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:07 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:07 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:07 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2529.612750][T15101] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2529.672165][ C1] net_ratelimit: 5218 callbacks suppressed [ 2529.672178][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2529.690538][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2529.703001][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:07 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) [ 2529.749974][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2529.763243][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2529.777530][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:07 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2529.789975][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2529.802511][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2529.814942][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2529.828178][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:07 executing program 2: [ 2529.938582][T15219] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:07 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000001e40)=[{{&(0x7f0000000c00)=@sco, 0x80, 0x0}}, {{&(0x7f0000001340)=@hci, 0x80, 0x0}}], 0x2, 0x0) [ 2530.196928][T15231] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:08 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:08 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:08 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:08 executing program 2: fanotify_init(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:31:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') setgroups(0x54b, &(0x7f0000000180)) pread64(r3, 0x0, 0x2, 0x4) [ 2530.602509][T15340] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:10 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:10 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}], 0x1, 0x0) 04:31:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:10 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:10 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) [ 2532.770558][T15462] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:10 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:10 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:10 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:10 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl(r0, 0xffffffffffffffbc, &(0x7f0000000140)) [ 2532.931614][T15470] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:10 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:10 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:10 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c007abc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:10 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003340)=[{{0x0, 0x4000000000000, 0x0}}], 0x600, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:31:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:11 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:11 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:11 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 04:31:11 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:11 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:11 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:11 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2533.880990][T15719] validate_nla: 3 callbacks suppressed [ 2533.881000][T15719] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:11 executing program 2: ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") sendmmsg(0xffffffffffffffff, &(0x7f0000007940)=[{{&(0x7f00000004c0)=@generic={0x0, "b1262b3dfc42e7249ef094bf3ac679f0d4b1e5ec6b49377da70efa1cedaf1e1a358bfb652be1bfb4e0b4eba3a0835a65299d45c4b6993bb0ab215ee4ca96425bebece2ed208a7d2f96d8985f3e269c1d8abbeef5473418d5a886c9438af8e8d9396529349a85e46483f90bd2d49b7a7625d8072ea45f00a717ca51d9e078"}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000000640)="da7e9902c4", 0x5}, {&(0x7f0000000680)="19a987b7a0f957a921d591831d76c3f3c9eb495c4eb40aa192befad4aa4d966b228b2ecaf76dda0dfbea58eae2", 0x2d}, {&(0x7f0000000740)="0cec8478b025511f12189322639e1169e55571386f5f9fdfd157ae64e365a5b38d3920e732eab1701716c8d5976a552e3c0ef3eaf95b14860eace7ae4c8a8f08a9b8d21c1fbfc1893c382c5100a49178b37d05f3b8873dfe64bddf9d5a8235db0f303b139cbcd0e394eb9b4d44ad409238e91f1949cfd1d9cb9495b4b36f548ae58ff4", 0x83}], 0x3}}], 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') setgroups(0x54b, &(0x7f0000000180)) pread64(r3, 0x0, 0x0, 0x0) 04:31:11 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:11 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:12 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:12 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:12 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/mcfilter6\x00') readv(r0, &(0x7f0000000240)=[{&(0x7f0000000600)=""/167, 0xa7}], 0x1) 04:31:12 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2534.691793][ C1] net_ratelimit: 5325 callbacks suppressed [ 2534.691804][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2534.701723][T15847] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2534.710093][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:12 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 04:31:12 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:12 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2534.731026][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2534.743581][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2534.756034][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2534.768566][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:12 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0cfec0bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) [ 2534.781844][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2534.795955][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2534.808371][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2534.820861][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) 04:31:12 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:12 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2535.021292][T15923] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000f46000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff29784c6ba50200000000000000005f136ebacafb6c7f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000a00000000000000fe8000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100"/400], 0x190) 04:31:13 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:13 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000001300)="fe", 0x1}], 0x1}, 0x0) sendmsg$alg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) close(r0) 04:31:13 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:13 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2535.582766][T15981] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:13 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:13 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:13 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') preadv(r0, &(0x7f0000000600)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) io_setup(0x0, 0x0) setfsgid(0x0) 04:31:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fadvise64(0xffffffffffffffff, 0x0, 0x1, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file0', [{}, {0x20, 'system.advise\x00'}, {0x20, 'cpuacct.usage_percpu_sys\x00'}, {}, {0x20, '.'}, {0x20, 'trusted^user@mime_type'}, {}]}, 0x50) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="24000000120007031dfffd946fa2830012000a0009000000741d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) socket$inet6(0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000bc0)={{0x0, 0x989680}}, &(0x7f0000000340)) [ 2535.800455][T16097] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:13 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:13 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2536.046751][T16159] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:14 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) ptrace(0xffffffffffffffff, 0x0) 04:31:14 executing program 1: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') fchdir(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00,c\x98~\xa3j\x97\xb6c\xc4\n\x8ex\\\x00\xd0W\x18\xf6\xd5\x95%\b\xba\xf9\x97\xb3\x0e\xf0\xf0l\xadn\a\x9aPR\x9fT\x18\x00\xad\xd9EU[~;\xc1\x97\x0f\x1e:\xba\xadN\x18\xf2\xc24\"\x9e\xbb*d\xe0}\xf1D\x937[\x87g\xbb\x85Y\xe2\x1d\xef\x9ay\x9fi\x91\xcbD\x8d\xa3Y`\xfc\x1bin\xce\xa9J\xc7\xa6#\x86\xe2\xdb\xc9\xec\xf2c\xf8p`\x17tF\xe4>\xf2\xa6\xe1\x89\x97=\x03\xae]\"oc#I\xaa\x80f\xcc\xe1\x1c\xd3\x8b9>\xdaR\xdab\xfc\xbb!\xde\xf5\xa6\x85\xda\xa7\x81\xa5\x83\xa7eV\xe4\xba\x1f\xb4MY\xb9/\x9c\xbc\x94\xb7#\xb2v\xd8\xcf\x9b\x90*95\xcd\xfbdG\xfb\x8ao~T\xc0\x1489\xc2\xfeo\x1c\xda\x03\xb5x\'\xa3\xf5\xae\xb8YW\x9f\x9c\xd5\x9bU\xbd~\xff\x95W#ze\x01\xc8^\x8e\x8bs\xf7\x92\xa8\x97\x7f\xa2\x13\xcf\x14\xc633', 0x200002, 0x0) 04:31:14 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:14 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2536.505495][T16224] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:14 executing program 1: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:14 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:14 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) ptrace(0xffffffffffffffff, 0x0) 04:31:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x40000000010, 0x0, 0x0) 04:31:14 executing program 1: pipe(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) [ 2536.730908][T16436] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:14 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:14 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) ptrace(0xffffffffffffffff, 0x0) 04:31:14 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c00000300020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:14 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:14 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:14 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r0, &(0x7f0000000c00)=[{&(0x7f00000008c0)=""/50, 0xfdef}], 0x1) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) getgid() syz_genetlink_get_family_id$tipc(0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x7fffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) [ 2537.468255][T16562] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2537.492587][T16562] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:15 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:15 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) ptrace(0xffffffffffffffff, 0x0) 04:31:15 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:15 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)=""/120, 0x78}], 0x1}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000004480)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f000000a700)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000001200)="99c3c7f21eda1c1c0ca0542989ac69d82fab5681b364d33803a0da78937b5da85cc82c04653f715baa8d723231255f9e4455b65509fa6e9bccb8984e126c47e57536bc2e9d346ed9ef1a9cb018a65ca5b027f15a7d7b100a72a26b49d9e26364776546c78477ce9d906f9bea3e8bff9674f62a6571192be529", 0x79}], 0x1}}], 0x1, 0x0) [ 2537.747802][T16680] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:15 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:15 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:15 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:15 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)=""/120, 0x78}], 0x1}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000004480)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f000000a700)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000001200)="99c3c7f21eda1c1c0ca0542989ac69d82fab5681b364d33803a0da78937b5da85cc82c04653f715baa8d723231255f9e4455b65509fa6e9bccb8984e126c47e57536bc2e9d346ed9ef1a9cb018a65ca5b027f15a7d7b100a72a26b49d9e26364776546c78477ce9d906f9bea3e8bff9674f62a6571192be529", 0x79}], 0x1}}], 0x1, 0x0) 04:31:15 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:16 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0004bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:16 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="1f00", 0x2) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r3 = socket(0x10, 0x0, 0x0) write(r3, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write(r3, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000080)={'veth1\x00', {0x2, 0x0, @broadcast}}) setsockopt$inet6_mreq(r2, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote}, 0x14) 04:31:16 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:16 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) [ 2538.602210][T16814] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 04:31:16 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:16 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:16 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:16 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:16 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000080)="fe", 0x1}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000e00)="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", 0x480, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 04:31:16 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2539.443488][T16936] validate_nla: 2 callbacks suppressed [ 2539.443498][T16936] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:17 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:17 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:17 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$FUSE_WRITE(r0, &(0x7f00000001c0)={0xc9, 0x0, 0x3}, 0x592) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0xc020660b, &(0x7f0000000000)) 04:31:17 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:17 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2539.732214][ C1] net_ratelimit: 3813 callbacks suppressed [ 2539.732227][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2539.738644][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2539.762792][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2539.775227][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2539.788573][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2539.801090][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2539.813513][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2539.826046][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2539.839286][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2539.853571][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2539.889620][T17079] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:17 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:17 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:17 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:17 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:17 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$alg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) close(r0) 04:31:17 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2540.368263][T17176] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:18 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:18 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0008bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r2, 0x0) ftruncate(r2, 0x0) 04:31:18 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2540.687097][T17289] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:18 executing program 3: 04:31:18 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) 04:31:18 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0009bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:18 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) [ 2540.967486][T17353] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:18 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) [ 2541.037315][T17476] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 04:31:18 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:18 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:18 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x8946, &(0x7f0000000080)={'syz_tun\x00', @ifru_addrs=@can={0x1d, 0x0}}) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0xdc, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_LINKINFO={0xbc, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xb0, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e21}], @tunl_policy=[@IFLA_IPTUN_FWMARK={0x8, 0x14, 0x2553}, @IFLA_IPTUN_LINK={0x8, 0x2, r4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e21}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_TTL={0x8, 0x4, 0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x7fff}], @tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x1}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x6}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x2, r6}], @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xb}, @tunl_policy=[@IFLA_IPTUN_FWMARK={0x8, 0x14, 0x5}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xc1}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e22}], @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x18}]}}}]}, 0xdc}}, 0x0) 04:31:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) [ 2541.267272][T17538] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:18 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:19 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2541.441560][T17674] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2541.449674][T17674] netlink: 'syz-executor.3': attribute type 17 has an invalid length. 04:31:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:19 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2541.531697][T17674] netlink: 'syz-executor.3': attribute type 17 has an invalid length. [ 2541.543850][T17740] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:19 executing program 4: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) clock_getres(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\xff\xff\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) 04:31:21 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:21 executing program 3: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x811, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x821}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:31:21 executing program 4: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:21 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:21 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:21 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='system_u:object_r:etc_aliases_t:s0\x00', 0x23) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3) mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0) getsockopt$inet_buf(r2, 0x0, 0x800000029, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) 04:31:21 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:21 executing program 4: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:21 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:21 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:21 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18}, 0x18) sendto$inet(r0, &(0x7f0000000480)="8b", 0x1, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/148, 0xff1e}], 0x1}}, {{0x0, 0xffffffffffffffcd, 0x0}}], 0x40001de, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:31:21 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:21 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:21 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)=0x80) 04:31:21 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:21 executing program 3: ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_targets\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000a80)='net/protocols\x00') dup2(r1, r0) 04:31:21 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2544.742599][ C1] net_ratelimit: 4462 callbacks suppressed [ 2544.742612][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2544.762555][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2544.774864][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2544.787285][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2544.799491][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2544.812620][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2544.824970][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2544.837339][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2544.849640][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2544.862576][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2545.906955][T18415] validate_nla: 14 callbacks suppressed [ 2545.906966][T18415] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:23 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:23 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:23 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:23 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) [ 2546.119712][T18808] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:23 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:23 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:23 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1b) [ 2546.323373][T18880] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x40000000008, &(0x7f00000001c0)={@remote}, 0x14) 04:31:24 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:24 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:24 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:24 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=0x1000) [ 2547.119539][T19054] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:24 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:24 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000000)) 04:31:24 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) 04:31:24 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:24 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:25 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) [ 2547.431251][T19375] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:25 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0048bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:25 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:25 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:25 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2547.727844][T19588] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:25 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:25 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) [ 2549.751791][ C1] net_ratelimit: 5789 callbacks suppressed [ 2549.751804][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2549.770047][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2549.782271][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2549.794772][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2549.806963][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2549.819990][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2549.832501][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2549.844877][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2549.857176][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2549.870058][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)={&(0x7f0000000000)={0x94, 0x0, 0x0, 0x0, 0x0, {0x0, 0x1000000, 0x3}, [@nested={0x18, 0x0, [@typed={0x7c, 0x1, @ipv6=@loopback={0xffffffff00000000}}]}]}, 0x99a1}, 0x1, 0xffffff7f0e000000}, 0x0) 04:31:27 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:27 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:27 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:27 executing program 2: r0 = socket(0x2, 0x3, 0x2) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) [ 2550.122255][T19824] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:27 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:27 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:27 executing program 2: r0 = socket(0x2, 0x3, 0x2) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) [ 2550.302815][T19925] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:27 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) 04:31:27 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:27 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:28 executing program 2: r0 = socket(0x2, 0x3, 0x2) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:28 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) [ 2550.586128][T20012] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:28 executing program 2: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:28 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:28 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2550.780423][T20061] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) 04:31:28 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:28 executing program 2: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:28 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:28 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x40000000012, 0x0, 0x0) [ 2551.412776][T20072] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:29 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:29 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:29 executing program 2: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:29 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003b40)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000680)=[@flowinfo={{0x10, 0x29, 0xb, 0x8000}}, @flowinfo={{0x10, 0x29, 0xb, 0x7fffffff}}], 0x20}}], 0x1, 0x0) [ 2551.644140][T20189] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:29 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) 04:31:30 executing program 2: r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:30 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:30 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:30 executing program 3: syz_open_dev$vcsa(0x0, 0x7, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0xfc89) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x1de) syslog(0x2, &(0x7f0000000000)=""/110, 0x6e) renameat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 04:31:30 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) [ 2552.732703][T20207] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:30 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:30 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:30 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x1, 0x0, 0x4}, 0x20) 04:31:30 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:30 executing program 2: r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) [ 2552.967948][T20421] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:30 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:31 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:31 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) write$FUSE_WRITE(r0, &(0x7f00000001c0)={0xc9, 0x0, 0x3}, 0x592) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0xc020660b, &(0x7f0000000000)) 04:31:31 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:31 executing program 2: r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000000) [ 2554.218029][T20542] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:31 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:31 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c00000300020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:31 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:31 executing program 2: r0 = socket(0x2, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:31 executing program 3: gettid() timer_create(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) shutdown(0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) socket$unix(0x1, 0x0, 0x0) time(0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = gettid() socket$unix(0x1, 0x0, 0x0) tkill(r0, 0x1000000000016) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2554.422186][T20758] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2554.473837][T20758] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:32 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:32 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, 0x0, 0x0, 0x0) 04:31:32 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc02020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:32 executing program 2: r0 = socket(0x2, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:32 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, 0x0, 0x0, 0x0) [ 2554.708009][T20881] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2554.742993][T20881] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2554.791127][ C1] net_ratelimit: 4611 callbacks suppressed [ 2554.791140][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2554.809538][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2554.822031][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2554.834461][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2554.847674][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2554.860178][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2554.872611][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:32 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc03020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) [ 2554.885064][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2554.898357][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2554.913240][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2554.978141][T20990] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2555.007137][T20990] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000000) 04:31:33 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, 0x0, 0x0, 0x0) 04:31:33 executing program 2: r0 = socket(0x2, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:33 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:33 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2556.261635][T21004] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2556.294659][T21004] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:35 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:31:35 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040), 0x0, 0x0) 04:31:35 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:35 executing program 2: r0 = socket(0x2, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:35 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000000) [ 2557.540061][T21124] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2557.575053][T21124] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:35 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:35 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040), 0x0, 0x0) [ 2557.788504][T21386] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:35 executing program 2: r0 = socket(0x2, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:35 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040), 0x0, 0x0) [ 2557.848253][T21386] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000080)="fe", 0x1}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000e00)="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", 0x480, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 04:31:35 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:35 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) [ 2558.096040][T21551] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:35 executing program 2: r0 = socket(0x2, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) [ 2558.159218][T21551] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:35 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) 04:31:35 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:35 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2558.362092][T21689] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2558.379065][T21689] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:36 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 04:31:36 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) 04:31:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) socket$inet(0x2, 0xa, 0x0) r2 = socket(0x400020000000010, 0x803, 0x0) sendfile(r2, r0, 0x0, 0x80000000) 04:31:36 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:36 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:36 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) [ 2558.804769][T21777] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2558.827655][T21777] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 04:31:36 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:36 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) [ 2559.042463][T21883] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2559.050643][T21883] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:36 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:36 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) [ 2559.227334][T21904] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:36 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:36 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\x02\x00\x00\x00\x00\x00\x00\x00\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\x9eHt\x89\xbc\xe7\x9c$BK\x8f\xc7\x12\xb2*?\x88(\xbf4)L\xac\x04=\xec\xe5\xeay\x1a\x7f\xd1\xf2\xd2T\x8d\xd5\xd1\xfb\xa8\xa5\xfc\xdcMG\x14\xd2`5j\x9b\x06', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3) 04:31:36 executing program 4: [ 2559.792206][ C1] net_ratelimit: 5234 callbacks suppressed [ 2559.792219][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2559.813207][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2559.825432][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2559.837864][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2559.850103][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2559.862558][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2559.874956][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2559.887902][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2559.900311][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2559.912557][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:37 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:37 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:37 executing program 3: 04:31:37 executing program 4: 04:31:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) socket$inet(0x2, 0xa, 0x0) r2 = socket(0x400020000000010, 0x803, 0x0) sendfile(r2, r0, 0x0, 0x80000000) [ 2560.227532][T22022] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:37 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2560.283994][T22022] __nla_validate_parse: 1 callbacks suppressed [ 2560.284004][T22022] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:37 executing program 4: 04:31:37 executing program 3: 04:31:38 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:38 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc0e020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:38 executing program 4: 04:31:38 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@random="cd3997030f02", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "e30a00", 0x18, 0x32, 0x0, @rand_addr="cda8358c4a5067368881057b32d496bb", @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}}, 0x0) [ 2560.579802][T22040] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2560.630066][T22040] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:38 executing program 4: 04:31:38 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:38 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:38 executing program 4: [ 2560.902014][T22056] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2560.976303][T22056] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) socket$inet(0x2, 0xa, 0x0) r2 = socket(0x400020000000010, 0x803, 0x0) sendfile(r2, r0, 0x0, 0x80000000) 04:31:39 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@random="cd3997030f02", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "e30a00", 0x18, 0x32, 0x0, @rand_addr="cda8358c4a5067368881057b32d496bb", @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}}, 0x0) 04:31:39 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:39 executing program 4: 04:31:39 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:39 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:39 executing program 4: 04:31:39 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@random="cd3997030f02", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "e30a00", 0x18, 0x32, 0x0, @rand_addr="cda8358c4a5067368881057b32d496bb", @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}}, 0x0) [ 2561.683141][T22072] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:39 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x6a0000e0}, 0x6e) 04:31:39 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@random="cd3997030f02", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "e30a00", 0x18, 0x32, 0x0, @rand_addr="cda8358c4a5067368881057b32d496bb", @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}}, 0x0) 04:31:39 executing program 4: 04:31:39 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2562.071455][T22191] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) r2 = socket(0x400020000000010, 0x803, 0x0) sendfile(r2, r0, 0x0, 0x80000000) 04:31:40 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:31:40 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 04:31:40 executing program 4: 04:31:40 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc12020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:40 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2562.618009][T22203] validate_nla: 2 callbacks suppressed [ 2562.618018][T22203] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2562.630259][T22203] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:40 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 04:31:40 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:31:40 executing program 4: 04:31:40 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:40 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 04:31:40 executing program 4: [ 2562.906626][T22221] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2562.972573][T22221] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) r2 = socket(0x400020000000010, 0x803, 0x0) sendfile(r2, r0, 0x0, 0x80000000) 04:31:40 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:31:40 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@random="cd3997030f02", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "e30a00", 0x18, 0x0, 0x0, @rand_addr="cda8358c4a5067368881057b32d496bb", @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}}, 0x0) 04:31:40 executing program 4: 04:31:40 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2563.291568][T22233] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2563.303712][T22233] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:41 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:41 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs, 0x6e) 04:31:41 executing program 4: 04:31:41 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@random="cd3997030f02", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "e30a00", 0x18, 0x0, 0x0, @rand_addr="cda8358c4a5067368881057b32d496bb", @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}}, 0x0) 04:31:41 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:41 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs, 0x6e) 04:31:41 executing program 4: [ 2563.592387][T22324] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2563.626792][T22324] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000000)=0x2) r2 = socket(0x400020000000010, 0x803, 0x0) sendfile(r2, r0, 0x0, 0x80000000) 04:31:41 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@random="cd3997030f02", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "e30a00", 0x18, 0x0, 0x0, @rand_addr="cda8358c4a5067368881057b32d496bb", @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}}, 0x0) 04:31:41 executing program 4: 04:31:41 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:41 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs, 0x6e) [ 2564.207224][T22368] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2564.254172][T22368] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:42 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:42 executing program 4: 04:31:42 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) 04:31:42 executing program 3: 04:31:42 executing program 4: 04:31:42 executing program 3: [ 2564.621953][T22480] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2564.802685][ C1] net_ratelimit: 3742 callbacks suppressed [ 2564.802700][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2564.820935][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2564.833423][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2564.845817][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2564.858294][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2564.870682][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2564.883940][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:42 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2564.896416][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2564.908790][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2564.921281][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:42 executing program 3: 04:31:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) 04:31:42 executing program 2: 04:31:42 executing program 4: [ 2565.139597][T22597] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:43 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:43 executing program 2: 04:31:43 executing program 3: 04:31:43 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:43 executing program 4: 04:31:43 executing program 3: [ 2565.483523][T22610] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:43 executing program 4: [ 2565.530407][T22610] __nla_validate_parse: 2 callbacks suppressed [ 2565.530415][T22610] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:43 executing program 2: 04:31:43 executing program 4: 04:31:43 executing program 3: 04:31:43 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc74020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:43 executing program 2: [ 2566.247064][T22627] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2566.270403][T22627] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:44 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:44 executing program 2: 04:31:44 executing program 4: 04:31:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) 04:31:44 executing program 3: 04:31:44 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:44 executing program 3: 04:31:44 executing program 2: [ 2566.555274][T22641] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:44 executing program 4: [ 2566.620817][T22641] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:44 executing program 2: 04:31:44 executing program 3: 04:31:44 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2566.859342][T22657] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:44 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:44 executing program 4: 04:31:44 executing program 2: 04:31:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) 04:31:44 executing program 3: 04:31:44 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:45 executing program 3: 04:31:45 executing program 2: [ 2567.436155][T22665] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:45 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bcfc020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:45 executing program 4: 04:31:45 executing program 3: 04:31:45 executing program 2: [ 2567.682127][T22681] validate_nla: 2 callbacks suppressed [ 2567.682136][T22681] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2567.746530][T22681] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. 04:31:45 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:45 executing program 3: 04:31:45 executing program 4: 04:31:45 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc00030000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:45 executing program 2: 04:31:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) 04:31:46 executing program 2: [ 2568.451078][T22695] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2568.488135][T22695] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 04:31:46 executing program 4: 04:31:46 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc00050000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:46 executing program 3: [ 2568.671024][T22707] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:46 executing program 4: 04:31:46 executing program 2: 04:31:46 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:46 executing program 3: clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) readv(r1, &(0x7f0000000640)=[{&(0x7f00000000c0)=""/53, 0x35}], 0x1) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) dup3(r2, r1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) tkill(r0, 0x1000000000015) 04:31:46 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) 04:31:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000040)=0x4df, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00009, 0x0, 0x0, 0x0, 0x2000000000002) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:31:46 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) [ 2569.437328][T22727] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2569.473776][T22727] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 04:31:47 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:47 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc00070000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:47 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2569.651700][T22932] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:47 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2569.819098][ C1] net_ratelimit: 4176 callbacks suppressed [ 2569.819111][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2569.837512][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2569.849932][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2569.862427][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2569.875704][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2569.890923][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2569.903319][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:47 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:47 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) [ 2569.915789][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2569.928101][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2569.940572][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2569.993385][T22949] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:47 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:47 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:47 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc000a0000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) [ 2570.347979][T22957] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:47 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:48 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) [ 2570.502138][T22965] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:48 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:48 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc001e0000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:50 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0x8001) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:50 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:50 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:50 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[], 0xff0e) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000, 0x0) 04:31:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) 04:31:50 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2572.899149][T22982] validate_nla: 2 callbacks suppressed [ 2572.899158][T22982] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:50 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:50 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) r3 = socket(0x400020000000010, 0x803, 0x0) sendfile(r3, r0, 0x0, 0x80000000) 04:31:50 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:50 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:50 executing program 4: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:50 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) [ 2573.246430][T23006] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:50 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:50 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) 04:31:50 executing program 4: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) [ 2573.412520][T23017] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2573.449286][T23017] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 04:31:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) r2 = socket(0x400020000000010, 0x803, 0x0) sendfile(r2, r0, 0x0, 0x80000000) [ 2574.823440][ C1] net_ratelimit: 6463 callbacks suppressed [ 2574.823453][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2574.841765][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2574.854117][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2574.866517][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2574.878892][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2574.891227][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2574.904081][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2574.916517][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2574.928795][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2574.941219][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:53 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:53 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:53 executing program 4: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:53 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) r2 = socket(0x400020000000010, 0x803, 0x0) sendfile(r2, r0, 0x0, 0x80000000) 04:31:53 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 2576.064848][T23037] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2576.099402][T23037] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:53 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:53 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) r2 = socket(0x400020000000010, 0x803, 0x0) sendfile(r2, r0, 0x0, 0x80000000) 04:31:53 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) [ 2576.312238][T23056] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:53 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:53 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 04:31:54 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:54 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc00060000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:54 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) r2 = socket(0x400020000000010, 0x803, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000) 04:31:54 executing program 1: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:54 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:54 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) [ 2577.030057][T23074] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2577.069137][T23074] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 04:31:54 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:54 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:54 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) [ 2577.296126][T23089] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 04:31:54 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="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", 0xfc) 04:31:54 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) [ 2579.831535][ C1] net_ratelimit: 6690 callbacks suppressed [ 2579.831548][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2579.849887][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2579.862320][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2579.874778][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2579.887088][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2579.900221][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2579.912540][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2579.924950][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2579.937277][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2579.950234][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 04:31:57 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "521d7e97cda60c1f70b536098c1c22ff", "29016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 04:31:57 executing program 0: r0 = socket(0x800000000000010, 0x3, 0x0) write(r0, &(0x7f0000000680)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100040005d0000000000000039815fa2c1ec28656aaa79bb94b46fe0c0000bc00090000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e325f772c05defd5a32e280fc83ab82f605f70c9ddef23be0d5fcfe082038f4f8b29d3ef3d92c83170e5bba4a3bd284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed9409000000000000007c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429f000000000000", 0xfc) 04:31:57 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x6000, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 04:31:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000000)="3f006671d7af52f647740500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x1b0, 0x0, 0x0, 0x0}, 0x630f057c0eb08b7a) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) r2 = socket(0x400020000000010, 0x803, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000) [ 2580.422320][T23108] validate_nla: 1 callbacks suppressed [ 2580.422328][T23108] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2584.841891][ C1] net_ratelimit: 8355 callbacks suppressed [ 2584.841902][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2584.860217][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2584.872623][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2584.885102][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2584.897834][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2584.912687][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2584.924927][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2584.937343][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2584.949564][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2584.961981][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2589.851628][ C1] net_ratelimit: 9443 callbacks suppressed [ 2589.851638][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2589.872240][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2589.884474][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2589.896874][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2589.909055][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2589.921478][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2589.933669][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2589.946789][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2589.959088][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2589.971448][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2594.861482][ C1] net_ratelimit: 9221 callbacks suppressed [ 2594.861495][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2594.879745][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2594.891936][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2594.904364][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2594.916541][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2594.929675][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2594.941935][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2594.954251][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2594.966512][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2594.979574][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2599.871676][ C1] net_ratelimit: 9691 callbacks suppressed [ 2599.871688][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2599.889867][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2599.902171][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2599.915303][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2599.928920][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2599.942619][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2599.954988][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2599.967483][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2599.979898][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2599.992225][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2604.882079][ C1] net_ratelimit: 9697 callbacks suppressed [ 2604.882092][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2604.900403][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2604.912634][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2604.925072][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2604.937728][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2604.951312][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2604.964320][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2604.976647][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2604.988962][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2605.001262][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2609.891686][ C1] net_ratelimit: 9625 callbacks suppressed [ 2609.891700][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2609.909881][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2609.922416][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2609.935966][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2609.948177][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2609.960615][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2609.973293][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2609.985844][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2609.998048][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2610.011199][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2614.901561][ C1] net_ratelimit: 9015 callbacks suppressed [ 2614.901575][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2614.919948][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2614.932183][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2614.944605][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2614.957296][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2614.970454][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2614.982638][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2614.995455][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2615.008470][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2615.020811][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2619.911687][ C1] net_ratelimit: 8521 callbacks suppressed [ 2619.911701][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2619.929875][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2619.942786][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2619.956370][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2619.968568][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2619.981031][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2619.993729][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2620.006171][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2620.018360][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2620.031523][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2624.922349][ C1] net_ratelimit: 8564 callbacks suppressed [ 2624.922363][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2624.940763][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2624.953125][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2624.966327][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2624.978668][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2624.991023][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2625.003354][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2625.016547][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2625.029339][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2625.041731][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2629.932061][ C1] net_ratelimit: 8715 callbacks suppressed [ 2629.932074][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2629.950412][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2629.962834][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2629.975286][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2629.988015][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2630.001230][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2630.013436][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2630.026300][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2630.039330][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2630.051688][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2634.942262][ C1] net_ratelimit: 8544 callbacks suppressed [ 2634.942276][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2634.960564][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2634.972745][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2634.985172][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2634.997838][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2635.011005][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2635.023207][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2635.036055][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2635.049116][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2635.061464][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2639.951900][ C1] net_ratelimit: 7876 callbacks suppressed [ 2639.951913][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2639.971169][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2639.983398][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2639.996245][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2640.009273][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2640.021665][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2640.033966][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2640.047081][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2640.059484][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2640.071841][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2644.961552][ C1] net_ratelimit: 9628 callbacks suppressed [ 2644.961566][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2644.980597][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2644.992911][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2645.005245][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2645.017931][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2645.030345][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2645.042600][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2645.055057][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2645.067770][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2645.080934][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2649.971831][ C1] net_ratelimit: 9703 callbacks suppressed [ 2649.971842][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2649.991279][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2650.003687][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2650.016087][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2650.029091][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2650.041541][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2650.053715][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2650.066815][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2650.079095][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2650.091521][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2654.981478][ C1] net_ratelimit: 9571 callbacks suppressed [ 2654.981492][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2654.999686][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2655.012437][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2655.024883][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2655.037095][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2655.049493][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2655.062748][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2655.075910][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2655.088117][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2655.100950][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2659.991483][ C1] net_ratelimit: 8915 callbacks suppressed [ 2659.991498][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2660.009815][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2660.022397][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2660.036019][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2660.048965][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2660.061661][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2660.074409][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2660.086874][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2660.099124][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2660.112322][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2665.002307][ C1] net_ratelimit: 8701 callbacks suppressed [ 2665.002317][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2665.020554][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2665.033062][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2665.046280][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2665.058599][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2665.070944][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2665.083667][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2665.096147][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2665.108382][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2665.120892][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2670.011485][ C1] net_ratelimit: 8595 callbacks suppressed [ 2670.011495][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2670.029792][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2670.042232][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2670.056222][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2670.068531][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2670.080879][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2670.093181][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2670.106342][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2670.119106][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2670.131464][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2675.021805][ C1] net_ratelimit: 8950 callbacks suppressed [ 2675.021818][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2675.040146][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2675.052336][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2675.066245][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2675.078498][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2675.090805][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2675.103100][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2675.116218][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2675.128932][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2675.141229][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2680.032366][ C1] net_ratelimit: 8926 callbacks suppressed [ 2680.032379][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2680.050584][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2680.063114][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2680.076670][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2680.088847][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2680.101248][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2680.113931][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2680.126249][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2680.138505][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2680.150899][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2685.041737][ C1] net_ratelimit: 8173 callbacks suppressed [ 2685.041751][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2685.060120][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2685.072649][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2685.085011][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2685.098218][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2685.110694][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2685.122937][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2685.135378][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2685.148077][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2685.161293][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2690.051719][ C1] net_ratelimit: 8458 callbacks suppressed [ 2690.051730][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2690.069972][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2690.082215][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2690.094661][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2690.107376][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2690.120633][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2690.132851][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2690.145727][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2690.158743][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2690.171141][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2695.061562][ C1] net_ratelimit: 8252 callbacks suppressed [ 2695.061572][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2695.080414][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2695.094134][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2695.106453][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2695.118754][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2695.131966][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2695.144210][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2695.156629][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2695.168893][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2695.181197][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2700.072379][ C1] net_ratelimit: 8548 callbacks suppressed [ 2700.072393][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2700.091616][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2700.103951][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2700.116850][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2700.129860][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2700.142206][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2700.154529][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2700.167737][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2700.179907][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2700.192331][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2705.081483][ C1] net_ratelimit: 7959 callbacks suppressed [ 2705.081493][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2705.099797][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2705.112893][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2705.126837][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2705.139078][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2705.151604][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2705.165140][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2705.177559][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2705.189921][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2705.202447][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2710.091626][ C1] net_ratelimit: 8237 callbacks suppressed [ 2710.091640][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2710.109945][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2710.122251][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2710.134584][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2710.147727][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2710.160108][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2710.172296][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2710.184701][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2710.197927][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2710.211096][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2715.101826][ C1] net_ratelimit: 8219 callbacks suppressed [ 2715.101839][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2715.120085][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2715.132427][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2715.145833][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2715.158700][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2715.171087][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2715.183684][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2715.197611][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2715.209831][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2715.222324][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2720.113329][ C1] net_ratelimit: 7957 callbacks suppressed [ 2720.113342][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2720.131863][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2720.144270][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2720.156835][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2720.169553][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2720.182875][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2720.195272][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2720.208116][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2720.221166][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2720.233512][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2725.122460][ C1] net_ratelimit: 8550 callbacks suppressed [ 2725.122470][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2725.140885][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2725.153347][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2725.165836][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2725.178595][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2725.192307][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2725.204618][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2725.217607][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2725.230777][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2725.243326][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2730.133270][ C1] net_ratelimit: 8160 callbacks suppressed [ 2730.133284][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2730.152478][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2730.164897][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2730.178454][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:ca:44:4a:35:0e:99, vlan:0) [ 2730.191600][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2730.203786][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2730.216235][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2730.228932][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2730.241284][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2730.253755][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2735.141528][ C1] net_ratelimit: 7954 callbacks suppressed [ 2735.141542][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2735.160054][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2735.172376][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 2735.184749][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2735.197977][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2735.210446][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2735.222662][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2735.235105][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2735.247305][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2735.259620][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2735.991743][ T1063] INFO: task syz-executor.1:23070 blocked for more than 143 seconds. [ 2735.999881][ T1063] Not tainted 5.4.0-rc3 #0 [ 2736.017762][ T1063] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2736.030152][ T1063] syz-executor.1 D28160 23070 8618 0x00000004 [ 2736.047204][ T1063] Call Trace: [ 2736.050558][ T1063] __schedule+0x94f/0x1e70 [ 2736.067428][ T1063] ? __sched_text_start+0x8/0x8 [ 2736.080836][ T1063] ? __kasan_check_read+0x11/0x20 [ 2736.095154][ T1063] ? __lock_acquire+0x16f2/0x4a00 [ 2736.100236][ T1063] schedule+0xd9/0x260 [ 2736.117384][ T1063] schedule_timeout+0x717/0xc50 [ 2736.128395][ T1063] ? __kasan_check_read+0x11/0x20 [ 2736.143734][ T1063] ? usleep_range+0x170/0x170 [ 2736.148461][ T1063] ? mark_held_locks+0xa4/0xf0 [ 2736.161278][ T1063] ? _raw_spin_unlock_irq+0x28/0x90 [ 2736.177816][ T1063] ? wait_for_completion+0x294/0x440 [ 2736.187218][ T1063] ? _raw_spin_unlock_irq+0x28/0x90 [ 2736.203990][ T1063] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2736.209329][ T1063] ? trace_hardirqs_on+0x67/0x240 [ 2736.226551][ T1063] ? __kasan_check_read+0x11/0x20 [ 2736.239452][ T1063] wait_for_completion+0x29c/0x440 [ 2736.256690][ T1063] ? wait_for_completion_interruptible+0x470/0x470 [ 2736.275423][ T1063] ? wake_up_q+0xf0/0xf0 [ 2736.279720][ T1063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2736.297128][ T1063] ? __kasan_check_read+0x11/0x20 [ 2736.310118][ T1063] __flush_work+0x508/0xa60 [ 2736.327146][ T1063] ? queue_delayed_work_on+0x210/0x210 [ 2736.332677][ T1063] ? init_pwq+0x360/0x360 [ 2736.337052][ T1063] ? __cancel_work_timer+0xc4/0x540 [ 2736.354780][ T1063] ? __cancel_work_timer+0x1e0/0x540 [ 2736.360115][ T1063] ? cancel_delayed_work_sync+0x1b/0x20 [ 2736.377885][ T1063] ? __cancel_work_timer+0x1e0/0x540 [ 2736.389174][ T1063] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2736.408730][ T1063] ? trace_hardirqs_on+0x67/0x240 [ 2736.419544][ T1063] __cancel_work_timer+0x3d9/0x540 [ 2736.436885][ T1063] ? mod_delayed_work_on+0x200/0x200 [ 2736.454320][ T1063] ? debug_object_active_state+0x28a/0x350 [ 2736.460189][ T1063] ? mark_held_locks+0xf0/0xf0 [ 2736.478960][ T1063] cancel_delayed_work_sync+0x1b/0x20 [ 2736.485319][ T1063] tls_sw_cancel_work_tx+0x68/0x80 [ 2736.490452][ T1063] tls_sk_proto_close+0x4c9/0x9c0 [ 2736.495525][ T1063] ? lock_acquire+0x190/0x410 [ 2736.500209][ T1063] ? wait_on_pending_writer+0x420/0x420 [ 2736.517632][ T1063] ? ip_mc_drop_socket+0x211/0x270 [ 2736.528892][ T1063] ? down_write+0xdf/0x150 [ 2736.545302][ T1063] inet_release+0xed/0x200 [ 2736.549770][ T1063] inet6_release+0x53/0x80 [ 2736.574232][ T1063] __sock_release+0xce/0x280 [ 2736.578889][ T1063] sock_close+0x1e/0x30 [ 2736.595852][ T1063] __fput+0x2ff/0x890 [ 2736.599907][ T1063] ? __sock_release+0x280/0x280 [ 2736.617291][ T1063] ____fput+0x16/0x20 [ 2736.621324][ T1063] task_work_run+0x145/0x1c0 [ 2736.641947][ T1063] exit_to_usermode_loop+0x316/0x380 [ 2736.647312][ T1063] do_syscall_64+0x65f/0x760 [ 2736.664387][ T1063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2736.670328][ T1063] RIP: 0033:0x413741 [ 2736.689850][ T1063] Code: 00 b8 2d f8 ff ff 0f 44 c2 c3 66 66 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 31 c0 c3 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 31 c3 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 48 c7 07 40 37 41 00 [ 2736.722754][ T1063] RSP: 002b:0000000000a6fbf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 2736.731223][ T1063] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413741 [ 2736.752008][ T1063] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2736.760044][ T1063] RBP: 0000000000000001 R08: ffffffff8100a2c1 R09: 00000000ff4911d2 [ 2736.778052][ T1063] R10: 0000000000a6fcd0 R11: 0000000000000293 R12: 000000000075bf20 [ 2736.789754][ T1063] R13: 00000000002752ac R14: 00000000007614a0 R15: 000000000075bf2c [ 2736.807551][ T1063] ? do_syscall_64+0x21/0x760 [ 2736.815993][ T1063] [ 2736.815993][ T1063] Showing all locks held in the system: [ 2736.834123][ T1063] 1 lock held by ksoftirqd/1/16: [ 2736.839102][ T1063] 1 lock held by khungtaskd/1063: [ 2736.855593][ T1063] #0: ffffffff88fab040 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 2736.878211][ T1063] 1 lock held by rsyslogd/8487: [ 2736.889746][ T1063] #0: ffff8880978886a0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 2736.908380][ T1063] 2 locks held by getty/8577: [ 2736.916811][ T1063] #0: ffff8880a711e090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2736.935752][ T1063] #1: ffffc90005f312e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2736.950988][ T1063] 2 locks held by getty/8578: [ 2736.965728][ T1063] #0: ffff8880961e7090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2736.980448][ T1063] #1: ffffc90005f1d2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2737.000613][ T1063] 2 locks held by getty/8579: [ 2737.005363][ T1063] #0: ffff88808cf54090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2737.020500][ T1063] #1: ffffc90005f2d2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2737.030153][ T1063] 2 locks held by getty/8580: [ 2737.041481][ T1063] #0: ffff8880a5848090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2737.050471][ T1063] #1: ffffc90005f352e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2737.065748][ T1063] 2 locks held by getty/8581: [ 2737.070450][ T1063] #0: ffff88808cce0090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2737.080454][ T1063] #1: ffffc90005f392e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2737.096202][ T1063] 2 locks held by getty/8582: [ 2737.100902][ T1063] #0: ffff8880a89cc090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2737.111334][ T1063] #1: ffffc90005f412e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2737.129023][ T1063] 2 locks held by getty/8583: [ 2737.133749][ T1063] #0: ffff888098cc7090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2737.149020][ T1063] #1: ffffc90005f112e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2737.158694][ T1063] 2 locks held by syz-executor.2/3650: [ 2737.169996][ T1063] #0: ffff8880969bd090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2737.179031][ T1063] #1: ffffc900132fd2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2737.194842][ T1063] 2 locks held by kworker/0:0/3203: [ 2737.200070][ T1063] #0: ffff8880aa427d28 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 2737.216163][ T1063] #1: ffff88802531fdc0 ((work_completion)(&(&sw_ctx_tx->tx_work.work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 2737.229773][ T1063] 1 lock held by syz-executor.1/23070: [ 2737.240353][ T1063] #0: ffff8880972fa700 (&sb->s_type->i_mutex_key#12){+.+.}, at: __sock_release+0x89/0x280 [ 2737.251590][ T1063] [ 2737.253950][ T1063] ============================================= [ 2737.253950][ T1063] [ 2737.268444][ T1063] NMI backtrace for cpu 0 [ 2737.272867][ T1063] CPU: 0 PID: 1063 Comm: khungtaskd Not tainted 5.4.0-rc3 #0 [ 2737.280230][ T1063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2737.290278][ T1063] Call Trace: [ 2737.293573][ T1063] dump_stack+0x172/0x1f0 [ 2737.297908][ T1063] nmi_cpu_backtrace.cold+0x70/0xb2 [ 2737.303108][ T1063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2737.309354][ T1063] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 2737.314987][ T1063] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 2737.320971][ T1063] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2737.326866][ T1063] watchdog+0x9d0/0xef0 [ 2737.331032][ T1063] kthread+0x361/0x430 [ 2737.335102][ T1063] ? reset_hung_task_detector+0x30/0x30 [ 2737.340645][ T1063] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2737.346885][ T1063] ret_from_fork+0x24/0x30 [ 2737.351512][ T1063] Sending NMI from CPU 0 to CPUs 1: [ 2737.357727][ C1] NMI backtrace for cpu 1 [ 2737.357732][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.4.0-rc3 #0 [ 2737.357737][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2737.357740][ C1] RIP: 0010:match_held_lock+0x71/0x510 [ 2737.357749][ C1] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 8e 03 00 00 66 f7 43 22 f0 ff <0f> 84 ae 01 00 00 48 8d 7e 08 48 b8 00 00 00 00 00 fc ff df 48 89 [ 2737.357752][ C1] RSP: 0018:ffff8880a990ef90 EFLAGS: 00000046 [ 2737.357759][ C1] RAX: 0000000000000003 RBX: ffff8880a98f6cd8 RCX: ffff8880a98f6cd8 [ 2737.357763][ C1] RDX: 0000000000000000 RSI: ffffffff899985e0 RDI: ffff8880a98f6cfa [ 2737.357767][ C1] RBP: ffff8880a990efc0 R08: ffff8880a98f6440 R09: ffff8880a98f6cd0 [ 2737.357771][ C1] R10: fffffbfff138b800 R11: ffffffff89c5c007 R12: ffffed101531ed9a [ 2737.357775][ C1] R13: ffff8880a98f6cd8 R14: ffffffff899985e0 R15: 0000000000000000 [ 2737.357779][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2737.357783][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2737.357787][ C1] CR2: 0000000000625208 CR3: 0000000096a4c000 CR4: 00000000001426e0 [ 2737.357791][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2737.357795][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2737.357797][ C1] Call Trace: [ 2737.357800][ C1] lock_is_held_type+0x1b8/0x320 [ 2737.357803][ C1] lockdep_rtnl_is_held+0x1b/0x30 [ 2737.357806][ C1] br_validate_ipv6+0x827/0xb80 [ 2737.357809][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2737.357812][ C1] ? __kasan_check_read+0x11/0x20 [ 2737.357815][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2737.357818][ C1] br_nf_forward_ip+0x1021/0x21e0 [ 2737.357821][ C1] ? br_nf_forward_arp+0x1670/0x1670 [ 2737.357824][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2737.357827][ C1] nf_hook_slow+0xbc/0x1e0 [ 2737.357829][ C1] __br_forward+0x393/0xb00 [ 2737.357832][ C1] ? br_forward_finish+0x400/0x400 [ 2737.357835][ C1] ? br_dev_queue_push_xmit+0x5e0/0x5e0 [ 2737.357838][ C1] deliver_clone+0x61/0xc0 [ 2737.357840][ C1] maybe_deliver+0x2c7/0x390 [ 2737.357843][ C1] br_flood+0x13a/0x3d0 [ 2737.357846][ C1] br_handle_frame_finish+0xb46/0x1670 [ 2737.357849][ C1] ? br_handle_local_finish+0x20/0x20 [ 2737.357852][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2737.357855][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 2737.357858][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2737.357861][ C1] ? nf_hook_slow+0xf0/0x1e0 [ 2737.357864][ C1] br_nf_hook_thresh+0x2e9/0x370 [ 2737.357866][ C1] ? br_handle_local_finish+0x20/0x20 [ 2737.357869][ C1] ? setup_pre_routing+0x4b0/0x4b0 [ 2737.357873][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2737.357876][ C1] ? br_handle_local_finish+0x20/0x20 [ 2737.357878][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 2737.357881][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 2737.357885][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2737.357888][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2737.357891][ C1] br_nf_pre_routing_finish_ipv6+0x6fa/0xdb0 [ 2737.357894][ C1] ? br_handle_local_finish+0x20/0x20 [ 2737.357897][ C1] ? __kasan_check_read+0x11/0x20 [ 2737.357900][ C1] br_nf_pre_routing_ipv6+0x456/0x840 [ 2737.357903][ C1] ? br_validate_ipv6+0xb80/0xb80 [ 2737.357905][ C1] ? br_nf_pre_routing.cold+0x2f/0x2f [ 2737.357909][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2737.357912][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2737.357915][ C1] ? skb_pull_rcsum+0x155/0x300 [ 2737.357918][ C1] br_nf_pre_routing+0x18af/0x22d1 [ 2737.357921][ C1] ? br_nf_pre_routing_finish+0x17a0/0x17a0 [ 2737.357924][ C1] ? br_nf_pre_routing_finish+0x17a0/0x17a0 [ 2737.357927][ C1] br_handle_frame+0x806/0x1340 [ 2737.357930][ C1] ? br_handle_frame_finish+0x1670/0x1670 [ 2737.357933][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2737.357936][ C1] ? br_handle_local_finish+0x20/0x20 [ 2737.357939][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 2737.357942][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2737.357946][ C1] ? br_handle_frame_finish+0x1670/0x1670 [ 2737.357949][ C1] __netif_receive_skb_core+0xfc1/0x3060 [ 2737.357952][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 2737.357955][ C1] ? __kasan_check_read+0x11/0x20 [ 2737.357957][ C1] ? do_xdp_generic+0x50/0x50 [ 2737.357960][ C1] ? __kasan_check_read+0x11/0x20 [ 2737.357963][ C1] ? __lock_acquire+0x8a0/0x4a00 [ 2737.357966][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 2737.357969][ C1] __netif_receive_skb_one_core+0xa8/0x1a0 [ 2737.357972][ C1] ? __netif_receive_skb_one_core+0xa8/0x1a0 [ 2737.357975][ C1] ? __netif_receive_skb_core+0x3060/0x3060 [ 2737.357978][ C1] ? lock_acquire+0x190/0x410 [ 2737.357981][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2737.357984][ C1] __netif_receive_skb+0x2c/0x1d0 [ 2737.357987][ C1] process_backlog+0x206/0x750 [ 2737.357990][ C1] ? net_rx_action+0x27b/0x1120 [ 2737.357993][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 2737.357995][ C1] net_rx_action+0x508/0x1120 [ 2737.357998][ C1] ? napi_busy_loop+0x970/0x970 [ 2737.358001][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2737.358005][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2737.358008][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2737.358011][ C1] __do_softirq+0x262/0x98c [ 2737.358013][ C1] ? takeover_tasklets+0x820/0x820 [ 2737.358016][ C1] run_ksoftirqd+0x8e/0x110 [ 2737.358019][ C1] smpboot_thread_fn+0x6a3/0xa40 [ 2737.358022][ C1] ? smpboot_register_percpu_thread+0x390/0x390 [ 2737.358030][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2737.358033][ C1] ? __kthread_parkme+0x108/0x1c0 [ 2737.358036][ C1] ? __kasan_check_read+0x11/0x20 [ 2737.358038][ C1] kthread+0x361/0x430 [ 2737.358041][ C1] ? smpboot_register_percpu_thread+0x390/0x390 [ 2737.358045][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2737.358047][ C1] ret_from_fork+0x24/0x30 [ 2737.364836][ T1063] Kernel panic - not syncing: hung_task: blocked tasks [ 2737.948753][ T1063] CPU: 0 PID: 1063 Comm: khungtaskd Not tainted 5.4.0-rc3 #0 [ 2737.956112][ T1063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2737.966159][ T1063] Call Trace: [ 2737.969452][ T1063] dump_stack+0x172/0x1f0 [ 2737.973785][ T1063] panic+0x2e3/0x75c [ 2737.977678][ T1063] ? add_taint.cold+0x16/0x16 [ 2737.982356][ T1063] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 2737.987991][ T1063] ? ___preempt_schedule+0x16/0x20 [ 2737.993105][ T1063] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 2737.999257][ T1063] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 2738.005426][ T1063] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 2738.011581][ T1063] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 2738.017736][ T1063] watchdog+0x9e1/0xef0 [ 2738.021899][ T1063] kthread+0x361/0x430 [ 2738.025970][ T1063] ? reset_hung_task_detector+0x30/0x30 [ 2738.031510][ T1063] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2738.037755][ T1063] ret_from_fork+0x24/0x30 [ 2738.043662][ T1063] Kernel Offset: disabled [ 2738.048027][ T1063] Rebooting in 86400 seconds..