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"], 0x3}}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer2\x00', 0x4001, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="2000000010002b04000000000000000000000000fb9ac6cbee08158f3dc363f9f70d9348a481f0f4b91d42a60947c1180b55cb494f1454d5c6ad13b1458411c85ee26ff54221e68ddd4a986d43b2387702a9ebc373147d38618852b8db16f1562189767ae283a4b6e1a5be9fcc3dad32290762028573a2420ee7c360e0d4588533b81d48439d44ba43587e0199c77574217e62e63eb61d839c3b98a78a5810cefe7667ee2f7c2f7659e28db1b8", @ANYRES32=r7, @ANYBLOB="8000000000000000"], 0x20}}, 0x0) r8 = creat(&(0x7f0000000140)='./file0\x00', 0x10) name_to_handle_at(r8, &(0x7f0000000240)='./file0\x00', &(0x7f0000000600)={0x1008, 0x8, "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"}, &(0x7f0000000280), 0x1000) lsetxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x4, 0x2) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000002c0)) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x240340, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r9, 0xc0305615, &(0x7f0000000540)={0x0, {0x45e4, 0x88be}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1, @dev={0xfe, 0x80, [], 0xa}, 0x1, 0x5146, 0x7, 0x200, 0x30, 0x80020222, r7}) [ 1559.001850][T26906] validate_nla: 11 callbacks suppressed [ 1559.001859][T26906] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1559.022608][T26903] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1559.031995][T26906] __nla_validate_parse: 2 callbacks suppressed [ 1559.032006][T26906] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000ffffff", 0x39}], 0x1) 22:35:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1559.173158][T26912] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1559.191523][T26912] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000f0ff", 0x39}], 0x1) [ 1559.330205][T26916] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1559.344824][T26919] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1559.362595][T26919] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1559.526408][T26923] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 22:35:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e000100060003480000000000009effff", 0x39}], 0x1) 22:35:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x5c) 22:35:20 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x81) bind$inet6(r1, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @loopback, 0x9}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, r2) ppoll(&(0x7f0000000600)=[{r4, 0x180}], 0x1, 0x0, 0x0, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f00000009c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000540)=ANY=[@ANYBLOB="cc0005fdff6d851d26", @ANYRES16=r6, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0xa533b6b32aa3f1c8) epoll_create1(0xc0000) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x808800}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="88f75af804802e1e9096c19cbb8c15", @ANYRES16=r6, @ANYBLOB="01002bbd7000fbdbdf250b00000008000400000800001c00010008000b007369700008000b00736970000800020039000000"], 0x38}, 0x1, 0x0, 0x0, 0x2080}, 0x4000000) 22:35:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r7, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x20, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x80}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000000)={'team0\x00', r7}) [ 1561.341312][T26942] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1561.350489][T26943] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1561.360085][T26942] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000040)=0xffffffff, 0x4) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RAUTH(r2, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xca, &(0x7f0000000380)={{0xa, 0x4e20, 0x1000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10000000}, {0xa, 0x0, 0x4, @mcast1}, 0x0, [0x0, 0x4]}, 0x5c) 22:35:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000f0ffff", 0x39}], 0x1) [ 1561.571452][T26959] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1561.603214][T26959] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1561.676661][T26953] device bridge19 entered promiscuous mode 22:35:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000f5ffff", 0x39}], 0x1) [ 1561.733616][T26956] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1561.752010][T26958] device bridge19 left promiscuous mode 22:35:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd6"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1561.853941][T26965] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000fcffff", 0x39}], 0x1) [ 1561.968897][ C0] net_ratelimit: 14 callbacks suppressed [ 1561.968906][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1561.980451][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1562.042001][T26971] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1562.187906][T26974] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1562.518844][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1562.524763][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1562.530640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1562.536948][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1563.158826][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1563.164700][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1563.170606][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1563.176436][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:35:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000ffffff", 0x39}], 0x1) 22:35:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcb, &(0x7f0000000380)={{0xa, 0x0, 0x1000000, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x408080) dup2(r2, r1) r3 = dup3(r0, r2, 0x80000) sendmsg$kcm(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)="00b2146200", 0x5}, {&(0x7f0000000040)="4912d0d82fb749cfd731d10e74cc3d0c7f60b6b86cc4c9a0b6923a577b7438cc8e1c9506a4", 0x25}, {&(0x7f0000000080)="f995609ec2ccdc57f72c202b9eb15d9f141aaf1166b9a16e12dc363d2b41431e7f94dc3d75e52df4a35cc4641147a494279c0a3a055883cb71a0516bf4ef624ec83b295f25e5fedb817e1e14de6b18138e6ea0f2a186dc44f33ad3ffe6a6f58c0a7b4ef8ac25a20a7019483ec3cd0c", 0x6f}, {&(0x7f0000000100)="03437807e1b4c71785d5dbd8a5c5ec01ae56b47bb2fa894acf1f9db4730b7cd79da041097996c807c282d24bc1b692e27075714f3204c378a255276ff8c733acafac4e0fadc741332b03dd776da84503e3cfdec3c522a52e4f2fc6926ee66e3394d95a2698db8cfeff421ccb34a6ef8130817a43dca06e45b50fb94aa194d73e3af665a9a63e3daaf351d6273adb926cdde70a7b7d36fb5cbc72ca24b11c99d294ed9ad9049c15b91a7adaa0762551c65b36e9ba2738ee4dad8615b679a0935920e897251809b9e79f2c0fa97719d7dcf48fc48f9eab24bd7c12d5", 0xdb}, {&(0x7f0000000200)="300ce1d3828482d30c5f1fbf71768bb494458a6744f32d0fa42af7d1175550653b68c36838ce093500648d04fa9524cb", 0x30}, {&(0x7f0000000240)="dfdc554e221d71c5f8b74352cd103c256226044d7984da7344b4ad03863c9d92fd3c0980fdab1cf838f06f6d8d1731582a71dd111d2dbaca4e980764076d4d718945225dfa60e6362411b2c901857bd75769edfec3d43e182da683b3208e93725f806a7589689a33c3770425431839c088bbff7405e8fecb4edacbbca31210e4dde7e23660fe0902db8692edb52348fd3050eca00a94f3eb2bd5c7ad81fdd280059ac511bda18236f93fc3a676d765295cf945e0704bbe26dc3d5e8550d2656894b4d531986a6fa00bf1d8492dac11346f04fc5c2dc7bac420528e7f59c690aba3a05fdb79002d8bbd71cf15a0cf4456", 0xf0}, {&(0x7f0000000400)="6240ecda6822125b73cffa18a6394e66c2ac92c5c99e4b9f294c674139f5376021bfc26fdcb9e819921a09399c4a4724dfcef8a3ee51b0ccc192f5dd8f3483194e74377f1cdedfe6fc77096629045014e8813675f98e1ca4a7e0e37090e99027d62512e6bb11fcb777b60234d18bd21ce8880da45db5e2198e2ff72c33b368f9003e902b1c050f39bbb82588ae31d7ed04387e8b53f3bdd293f04fc1bc32ec95aa78932a0ce052f43a33b80618dbf3150f4539e422b2bd43ad1cb491abdb2c32a19ebba1c553c5746a96f708e6a49fd5e64eb600cedf26dff25d8f0d5bcd3d5a136f425dc1", 0xe5}], 0x7, &(0x7f0000000580)=ANY=[@ANYBLOB="9800ff030000000000000000000400002d8f4504aa182b5a7d467da5fbf1331aa7655ee7f466672b7a40ab481e508d99607dd98bfb07291a003d5e666f7b9431f1d847c2b900285cd1fd85d50b467d3f81b2c94849c227ea0d1fcfcaf8ec2e176260c83b8156d77f45d327b128f29f2e5033342f4b37e0cccf61d25949e9e6c47af323416fdddfd3506d3fde49f496d7de72554f00000000980000000000000000000000ff7f0000e81163e5a0cacd8a2970bde8f7ab5b89640d757cc7d3e97eb31f0fe90b31f348d9ebfb21d9003dc14b025549900b5ec94e1e921cf5c0ae905d82c9f2d9e3835212c83670633caf27f02c45a2bb0a38ef643d57eab88201b890a1a414dbcf4c814fa8abe382046e73ea43b074bb12784538470821e1d62498ba482a8b8cc84b75af00000000000000"], 0x130}, 0x1018) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1, 0xfffffffd}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000]}, 0x1b) [ 1564.415031][T26986] validate_nla: 4 callbacks suppressed [ 1564.415041][T26986] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1564.439446][T26991] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 22:35:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcb, &(0x7f0000000380)={{0xa, 0x0, 0x1000000, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)) 22:35:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1564.500791][T26986] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:23 executing program 3: r0 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r2 = dup2(r1, r0) ppoll(&(0x7f0000000600)=[{r2, 0x180}], 0x1, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="3000f6280014052602000000db423b1bc321c63937eb00ec", @ANYRES32=r3, @ANYBLOB="0a5c070000000600e2ffe37f0800050003090000"], 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x2000000) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8000, 0x0) r6 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x101240) r8 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r10 = dup2(r9, r8) ppoll(&(0x7f0000000600)=[{r10, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r10, 0x11, 0xa, &(0x7f0000000240), &(0x7f0000000440)=0x4) r11 = dup2(r7, r6) ppoll(&(0x7f0000000600)=[{r11, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r11, 0xc0086420, &(0x7f00000000c0)={0x0}) getpeername(r4, &(0x7f0000000140)=@hci, &(0x7f00000001c0)=0x80) ioctl$DRM_IOCTL_GET_CTX(r5, 0xc0086423, &(0x7f0000000100)={r12, 0x1}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8800) ioctl$SNDCTL_DSP_SETFMT(r13, 0xc0045005, &(0x7f0000000040)=0x7) [ 1564.663492][T27006] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 22:35:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcb, &(0x7f0000000380)={{0xa, 0x0, 0x1000000, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1564.780192][T27009] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1564.810727][T27009] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1567.318835][ C1] net_ratelimit: 16 callbacks suppressed [ 1567.318844][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1567.330373][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1567.336541][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1567.342418][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:35:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:26 executing program 1 (fault-call:23 fault-nth:0): r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:26 executing program 0: socket$inet6(0xa, 0x3, 0x3a) r0 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r2 = dup2(r1, r0) ppoll(&(0x7f0000000600)=[{r2, 0x180}], 0x1, 0x0, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x101, 0x8, 0x2) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @local}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x5c) 22:35:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r3, 0xc0305602, &(0x7f0000000000)={0x0, 0x2, 0x2022}) [ 1567.548306][T27036] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1567.550424][T27035] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1567.567390][T27036] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1567.607786][T27029] FAULT_INJECTION: forcing a failure. [ 1567.607786][T27029] name failslab, interval 1, probability 0, space 0, times 0 [ 1567.645889][T27029] CPU: 0 PID: 27029 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1567.654657][T27029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1567.664732][T27029] Call Trace: [ 1567.668041][T27029] dump_stack+0x197/0x210 [ 1567.672398][T27029] should_fail.cold+0xa/0x15 [ 1567.677011][T27029] ? fault_create_debugfs_attr+0x180/0x180 [ 1567.682842][T27029] ? ___might_sleep+0x163/0x2c0 [ 1567.687715][T27029] __should_failslab+0x121/0x190 [ 1567.692772][T27029] should_failslab+0x9/0x14 [ 1567.697295][T27029] kmem_cache_alloc_node+0x268/0x740 [ 1567.702605][T27029] ? __kasan_check_read+0x11/0x20 [ 1567.707646][T27029] ? mark_lock+0xc2/0x1220 [ 1567.712076][T27029] ? find_held_lock+0x35/0x130 [ 1567.716861][T27029] __alloc_skb+0xd5/0x5e0 [ 1567.721239][T27029] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1567.726817][T27029] ? __local_bh_enable_ip+0x15a/0x270 [ 1567.732201][T27029] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1567.737603][T27029] ? ip6mr_sk_done+0x2d3/0x3b0 [ 1567.742376][T27029] ? trace_hardirqs_on+0x67/0x240 [ 1567.747587][T27029] inet6_netconf_notify_devconf+0xab/0x1f0 [ 1567.753436][T27029] ip6mr_sk_done+0x310/0x3b0 [ 1567.758038][T27029] ip6_mroute_setsockopt+0x758/0x1660 [ 1567.763436][T27029] ? ip6mr_sk_done+0x3b0/0x3b0 [ 1567.768237][T27029] ? __might_fault+0x12b/0x1e0 [ 1567.773034][T27029] ? find_held_lock+0x35/0x130 [ 1567.777804][T27029] ? __might_fault+0x12b/0x1e0 [ 1567.782727][T27029] ? lock_downgrade+0x920/0x920 [ 1567.787637][T27029] do_ipv6_setsockopt.isra.0+0x3d5/0x4220 [ 1567.793385][T27029] ? ipv6_update_options+0x3b0/0x3b0 [ 1567.798668][T27029] ? __kasan_check_read+0x11/0x20 [ 1567.798686][T27029] ? mark_lock+0xc2/0x1220 [ 1567.808380][T27029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1567.814662][T27029] ? debug_smp_processor_id+0x33/0x18a [ 1567.820148][T27029] ? perf_trace_lock+0xeb/0x4c0 [ 1567.824999][T27029] ? __kasan_check_read+0x11/0x20 [ 1567.825024][T27029] ? __lockdep_free_key_range+0x120/0x120 [ 1567.825046][T27029] ? __kasan_check_read+0x11/0x20 [ 1567.825062][T27029] ? mark_lock+0xc2/0x1220 [ 1567.845322][T27029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1567.851595][T27029] ? debug_smp_processor_id+0x33/0x18a [ 1567.857096][T27029] ? perf_trace_lock+0xeb/0x4c0 [ 1567.861957][T27029] ? __kasan_check_read+0x11/0x20 [ 1567.866993][T27029] ? __kasan_check_read+0x11/0x20 [ 1567.872029][T27029] ? mark_lock+0xc2/0x1220 [ 1567.876541][T27029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1567.882788][T27029] ? debug_smp_processor_id+0x33/0x18a [ 1567.888251][T27029] ? perf_trace_lock+0xeb/0x4c0 [ 1567.893201][T27029] ? __kasan_check_read+0x11/0x20 [ 1567.898241][T27029] ? __lockdep_free_key_range+0x120/0x120 [ 1567.903977][T27029] ? perf_trace_lock_acquire+0xf5/0x530 [ 1567.909534][T27029] ? debug_smp_processor_id+0x33/0x18a [ 1567.915034][T27029] ? __fget+0x35d/0x550 [ 1567.919201][T27029] ? find_held_lock+0x35/0x130 [ 1567.923970][T27029] ? __fget+0x35d/0x550 [ 1567.928153][T27029] ? ___might_sleep+0x163/0x2c0 [ 1567.933559][T27029] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1567.939817][T27029] ? aa_label_sk_perm+0x91/0xf0 [ 1567.944678][T27029] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1567.950319][T27029] ? aa_sk_perm+0x346/0xaf0 [ 1567.955811][T27029] ? __fget+0x37f/0x550 [ 1567.960378][T27029] ? aa_af_perm+0x2a0/0x2a0 [ 1567.964931][T27029] ipv6_setsockopt+0xf6/0x170 [ 1567.969620][T27029] ? ipv6_setsockopt+0xf6/0x170 [ 1567.974483][T27029] rawv6_setsockopt+0x5e/0x150 [ 1567.979267][T27029] sock_common_setsockopt+0x94/0xd0 [ 1567.984910][T27029] __sys_setsockopt+0x261/0x4c0 [ 1567.989777][T27029] ? sock_create_kern+0x50/0x50 [ 1567.994633][T27029] ? fput+0x1b/0x20 [ 1567.998464][T27029] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1568.003927][T27029] ? do_syscall_64+0x26/0x790 [ 1568.009142][T27029] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1568.015225][T27029] ? do_syscall_64+0x26/0x790 [ 1568.019931][T27029] __x64_sys_setsockopt+0xbe/0x150 [ 1568.025082][T27029] do_syscall_64+0xfa/0x790 [ 1568.029622][T27029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1568.035528][T27029] RIP: 0033:0x45a849 [ 1568.039431][T27029] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:35:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1568.059069][T27029] RSP: 002b:00007fb2ca466c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1568.067499][T27029] RAX: ffffffffffffffda RBX: 00007fb2ca466c90 RCX: 000000000045a849 [ 1568.075480][T27029] RDX: 00000000000000c9 RSI: 0000000000000029 RDI: 0000000000000005 [ 1568.083465][T27029] RBP: 000000000075bf20 R08: 000000000000005c R09: 0000000000000000 [ 1568.083476][T27029] R10: 0000000020000180 R11: 0000000000000246 R12: 00007fb2ca4676d4 [ 1568.083483][T27029] R13: 00000000004ca09b R14: 00000000004e23f0 R15: 0000000000000009 [ 1568.150802][T27045] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1568.172683][T27045] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1568.198883][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1568.204738][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:35:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1568.362297][T27051] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1568.377685][T27051] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1568.538488][T27047] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1568.541373][T27054] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:35:27 executing program 3: lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x80, 0x875}]}, 0xc, 0x0) r0 = socket$inet6(0xa, 0x5, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1568.585040][T27054] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1568.758862][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1568.764706][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1568.770623][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1568.776408][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:35:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:29 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:29 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1, 0xfffffffe}}, 0x5c) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, r2) ppoll(&(0x7f0000000600)=[{r4, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCGRS485(r4, 0x542e, &(0x7f00000000c0)) 22:35:29 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) r4 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r6 = dup2(r5, r4) ppoll(&(0x7f0000000600)=[{r6, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000640)=ANY=[@ANYRES32=0x0, @ANYBLOB="e10000001722ad4a19b3886eb13f087898c120b1ffe49698eb2b2ab7924f916844ae7c1e28f14a9dab3700bf6abca7dd96be935901b85f490a4e8f0ce4caecef1f7e63e534db6eba04e6eca7d6f5920f4b71f98de40de7fbe700af3672504c63de2cde0de02936e4541af0c3d62ccaf5a7e6164274de02d435c4e143cf34f64cb8dad20f3648c66fe09e6da687945d89e163918fba622db73c5f49d6010d7a57f5833f9b5fb215283c84a85d771e65fcc4d94f466595ddaae2dc162a94730bc31e0f4163c7c79f70dee78d742a00cfb73af3168b6b21f123f7fe0d046dd8085f916dcccc64"], &(0x7f0000000580)=0xe9) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000005c0)=@assoc_value={0x0, 0xfb9d}, &(0x7f0000000740)=0x8) sendmsg$inet_sctp(r6, &(0x7f0000000880)={&(0x7f0000000280)=@in6={0xa, 0x4e20, 0x400, @loopback}, 0x1c, &(0x7f0000000340)=[{&(0x7f00000002c0)="e0e536e70d0adf679452d89856c550d241818687dd532b187e3350421e6caa810f3852271e1a3cecd2f297e7", 0x2c}, {&(0x7f0000000400)="71ce623f591808bd663ca5977c14047cc7846f13783fd788e794018f2c2533baa97b292cbd7a53fe19b2cfbb9fc45ec4d86e17ec02085de8421d8bc0350bd45e2a5d3a40e097ea4619f94882ade7f0fe092e301fdfdac0e9a517e0a611f609e4527457e14675b693effee070b130c8672e7d8fb06dc8a7e8ae036f8e938c45d98f460e842c5ca0b1e71b32b649120464ec35aba6e49975491310e237dd56334f7eb2bb314264fa68d20f00bec22f9e125bf3a8266cd793b2f9914ddb8a749889bf2da50b5aa4ffe69b790e4b50f4f82232cd8dac6733a54af18cb0a423a4e1d775399a8f591c33a63dc047ef80059186e818", 0xf2}, {&(0x7f0000000300)="26b7b60a6b07797016693d7437a44421498c9cc56a2311bf63bd396854033e8343fe845f915b575174ca6cd2a3eb", 0x2e}, {&(0x7f0000000500)="5edb8dc6d44fc2438b4760dc09b166361538080f07b79563f848bc30187d4475293d4aedc140f82cf32d629af62d5cd7776e3c3c991590f6434faffbc923f03fb8dcdd58604ef746263b11c759101822d77028426e400f1330f17981c9c4061cffa289080ef83e1efb", 0x69}], 0x4, &(0x7f0000000780)=[@sndinfo={0x20, 0x84, 0x2, {0x3, 0x51fa3c53722f558c, 0x7, 0x5, r7}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @dstaddrv6={0x20, 0x84, 0x8, @loopback}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x11}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x8, 0x2, 0x7, 0x9, 0xfff, 0x5, 0x10000, r8}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @init={0x18, 0x84, 0x0, {0xff, 0x7f, 0x7, 0x81}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}], 0xf0, 0x4044881}, 0x40) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00', 0x4) r9 = socket$inet6(0xa, 0x3, 0x3a) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xac, r10, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x6, @mcast2, 0xffffffff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xd7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x7, @loopback, 0x4}}}}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0x80) setsockopt$inet6_MRT6_ADD_MFC(r9, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1570.659354][T27080] validate_nla: 1 callbacks suppressed [ 1570.659365][T27080] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1570.664533][T27084] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:35:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1570.717520][T27084] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1570.877176][T27095] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1570.893709][T27095] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1571.085811][T27099] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1571.108944][T27099] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1571.153262][T27091] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 22:35:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1571.279429][T27102] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1571.317709][T27102] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1571.338403][T27105] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 22:35:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1571.510170][T27112] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1571.550083][T27112] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1572.358838][ C0] net_ratelimit: 14 callbacks suppressed [ 1572.358848][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1572.370472][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1572.918852][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1572.924682][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1572.930576][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1572.936365][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1573.558841][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1573.564684][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1573.570569][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1573.576325][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:35:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:32 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) 22:35:32 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x3a, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev, 0x53af0c4e}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x5c) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000040)) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000000)={0x4, 0x9, 0x4, 0x1, 0x1}) [ 1573.741422][T27121] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1573.797102][T27121] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1573.974610][T27134] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1574.001369][T27134] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1574.180996][T27137] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0x20000005, @rand_addr="d65cbc7daf5a9d369c2ade6ce08fdbb7"}, {0xa, 0x0, 0xfffffffe, @mcast2, 0x1000}, 0x0, [0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x19, &(0x7f0000000140)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001b00)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r3}, 0x8) r4 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(r4, &(0x7f0000000000)='net/anycast6\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) ptrace$setopts(0x840c, 0xffffffffffffffff, 0x48e, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r5, 0x80082102, &(0x7f00000000c0)=r6) 22:35:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1574.416011][T27147] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:35 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3}}, {0xa, 0x0, 0x8, @mcast2}, 0x0, [0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1000]}, 0x5c) 22:35:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:35 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)={0x2, 'team_slave_1\x00', {0x5}, 0x8}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:35 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0x7, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1576.824044][T27160] validate_nla: 5 callbacks suppressed [ 1576.824055][T27160] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1576.838305][T27166] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1576.846917][T27160] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:35 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) ppoll(&(0x7f0000000600)=[{0xffffffffffffffff, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1577.083646][T27179] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1577.118290][T27179] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1577.236492][T27182] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1577.252103][T27182] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1577.379053][T27186] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1577.398902][T27186] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1577.433466][T27172] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 22:35:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1577.581049][T27190] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1577.718828][ C1] net_ratelimit: 16 callbacks suppressed [ 1577.718837][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1577.730437][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1577.736287][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1577.751721][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1578.598854][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1578.604735][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1579.158820][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1579.164650][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1579.170524][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1579.176306][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:35:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x184141, 0x0) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f00000000c0)={0x800000000000000, 0x5000, 0x1538, 0x8, 0x5}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r2 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x76}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r5 = dup2(r4, r3) ppoll(&(0x7f0000000600)=[{r5, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f00000002c0)={0x2, 0x0, [0x0, 0x0]}) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r5, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4001}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r6, 0x800, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x41010}, 0x20000840) ptrace$setsig(0x4203, r2, 0x7ff, &(0x7f0000000100)={0x33, 0x0, 0x3}) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f0000000040)="dfe69ff087ea8ce2488a50ac7704") 22:35:38 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="2ab2ad3ce1b25139ea6c1d98145fb941", 0x6, 0x3, 0x3, 0x0, 0x8, 0x5}, 0x20) 22:35:38 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0x14, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1579.961033][T27205] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1579.972227][T27206] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1579.988547][T27205] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1580.205625][T27220] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1580.232971][T27220] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYBLOB="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"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1580.446851][T27225] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYBLOB="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"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1580.677837][T27233] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1582.758819][ C0] net_ratelimit: 14 callbacks suppressed [ 1582.758829][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1582.770351][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:35:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:41 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x5c) 22:35:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYBLOB="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"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0xffffffff]}, 0x5c) 22:35:41 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0x15, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1583.089231][T27245] validate_nla: 5 callbacks suppressed [ 1583.089240][T27245] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1583.111615][T27248] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1583.134036][T27245] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:42 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3d) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x17}}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0xffffffff]}, 0x5c) socket$unix(0x1, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e22, 0xffff, @mcast2, 0x3}, {0xa, 0x4e22, 0x9, @remote, 0x2}, 0xe3, [0x2, 0xfffffff9, 0x268, 0x4, 0xffff, 0x0, 0x1ff, 0x4]}, 0x5c) 22:35:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1583.318814][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1583.324723][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1583.330629][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1583.336422][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1583.363010][T27262] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1583.395694][T27262] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1583.516365][T27267] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1583.524955][T27267] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1583.724044][T27271] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1583.740218][T27271] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1583.901781][T27265] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1583.938243][T27274] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1583.958819][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1583.964733][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1583.970657][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1583.974345][T27274] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1583.976437][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:35:45 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xaf) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:45 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x7) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e22, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:45 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0x1b, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1586.209949][T27289] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1586.223246][T27289] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:45 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x101800) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000040)) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, r2) ppoll(&(0x7f0000000600)=[{r4, 0x180}], 0x1, 0x0, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1586.439425][T27295] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1586.468065][T27312] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:35:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1586.522324][T27312] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1586.750743][T27325] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:35:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000200)={'eql\x00`\x05\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r4, r1) r5 = dup(r4) sendmmsg$alg(r5, &(0x7f00000005c0)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="b7c54b0970757b452db1c7e001a5b2129c01bb479b3031dacda6a2e95e3f6a363187ed3724afaafd942c0b57e8ed0ee0", 0x30}, {&(0x7f0000000040)="a546d5b4997c54838973f4e35bddc54220e7f5a55346a5e39a88f71c95d681ac4ba62d5090a5b660405c5f335ac49056ba23a51f6d17a5a7d0952205f275f270224006ca6bb451a299b4d0dd26fb677978bb6c0a", 0x54}], 0x2, &(0x7f0000000100)=[@assoc={0x18, 0x117, 0x4, 0x98}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x3ff}, @iv={0x70, 0x117, 0x2, 0x5c, "07177d2031e648afb521d44f90918a72e618782f0e81830310a2a4720b235731210379af5b2873d8699f5322c9298b02c0b07a10eb9e2b4544cb7dd52ec5678c6bc3b96f87486e192efd3f7c2f966a1e967089a82cd3f82dfe3f8379"}], 0xb8, 0x40044}, {0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="3dc29a8c65241918356b05bf4adb91c080deb1993462ecdd2f4e1b75483154d94296548741bd24", 0x27}], 0x1, 0x0, 0x0, 0x2040110}, {0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="253da4b2fa5578bea862e1c6c4f8d264bf012a28b849826fe2c7c69e15ae6830fad14a49ec502b1e40aeebab41a9b55d194a624d19ed170477bc7aed443c2ebcd6dc739ad61cacb2163b3fd0afd5ea3aae16c76ae92c8234705aef58df091878ddd9cd95f4b283e5fc7639ff648e05dc015d85de251bfd74243660e5a7785ade02e7122ae6f574", 0x87}, {&(0x7f0000000400)="aad6d7f093ccdc850f958bcc416724a75d689a4a452ebc7446c83098da112446f4c4f2e12b9bf6a446de62b884e4cd3d195f7f8f34b62c3f80370df4fec111f08394508baf021b630b90e24e120d84734eef120225100d603d7c7c35a333a92f05e25d694ed83b704d36e4ccfc0b3efcba613e91614af0138e7b4138616b28c7ee52f9b65c31cc53ef6c92fbfa2ad144639d0d5f29043f8ca7cc121789eca5144eb4d63a5d132e8efd55a0d43e39ff25034051887e6af6959fe6d68ce2fa5f5482bd0e2c32d40f1d8157345f13c947edbdeb1c56023bca54cc28ab458bb68f35ea461203af38e5f57e746689", 0xec}], 0x2, &(0x7f0000000500)=[@assoc={0x18, 0x117, 0x4, 0x20}, @assoc={0x18, 0x117, 0x4, 0x89f}, @assoc={0x18, 0x117, 0x4, 0x7}, @assoc={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x2}], 0x90, 0x4004400}], 0x3, 0x200000c1) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x1, 0x9, @dev, 0x8}, {0xa, 0x0, 0x0, @local}, 0x0, [0x0, 0x0, 0x60000000, 0x100]}, 0x5c) [ 1586.920101][T27332] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1587.103086][T27338] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1588.118809][ C1] net_ratelimit: 16 callbacks suppressed [ 1588.118818][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1588.130339][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1588.136196][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1588.142010][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1588.998817][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1589.004691][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1589.558873][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1589.558930][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1589.559016][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1589.559059][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:35:50 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0x1c, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000f0ff", 0x39}], 0x1) 22:35:50 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e23, 0x100, @mcast2, 0x1f}, {0xa, 0x4e20, 0x7ff, @loopback, 0x65}, 0x3ff, [0x7fff, 0x7f, 0x3, 0x7, 0xcb9, 0x81, 0x91e8, 0x2]}, 0x5c) [ 1591.129614][T27359] validate_nla: 5 callbacks suppressed [ 1591.129624][T27359] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1591.143385][T27361] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1591.143397][T27361] __nla_validate_parse: 1 callbacks suppressed [ 1591.143405][T27361] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000200", 0x39}], 0x1) 22:35:50 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) sendto$inet6(r0, &(0x7f0000000000)="256e41ca8b66aca2c1238ce16b9432f7b2e5bbe66cffb7c9cc79fe99059dc809d9030b08d6af0eade8388bdb3ba7905db72e46d00b6930c26c840abeea4950da08b50628e9eefc1a6e8611b86b4e1ad84aa908f9be50b16ec3e5461e0f3db5c3086c23f3972bfff167d372f5f40d88a3d9b45150154e81dad8bae180d1191ee423b70bd38ce7", 0x86, 0x10, &(0x7f00000000c0)={0xa, 0x4e24, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1591.351461][T27371] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1591.389879][T27371] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000300", 0x39}], 0x1) [ 1591.594933][T27380] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1591.627238][T27380] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1591.671198][T27377] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 22:35:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/e#\x00', 0x4, 0x2000) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'syzkaller1\x00', 0x200}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:50 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x20, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x80}}, 0x20}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20490000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@bridge_getlink={0xe8, 0x12, 0x400, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x0, r5, 0x4009}, [@IFLA_VF_PORTS={0xa4, 0x18, [{0x4c, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb1}, @IFLA_PORT_PROFILE={0x8, 0x2, '.\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x3}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2e9f0534faa4828e006c3d97bc963a1a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "9d1b732709d5ddf013515e3573d053ca"}]}, {0x54, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "e259c675562a4393dd5e743ac63fd1d5"}, @IFLA_PORT_PROFILE={0x10, 0x2, '\xc1/cpuset:\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "bf1ac8a413be9810c5e1cfd982f52061"}, @IFLA_PORT_VF={0x8, 0x1, 0x6}]}]}, @IFLA_IFNAME={0x14, 0x3, 'batadv0\x00'}, @IFLA_LINK_NETNSID={0x8}, @IFLA_TXQLEN={0x8, 0xd, 0x8000}]}, 0xe8}, 0x1, 0x0, 0x0, 0xc000804}, 0x800) r6 = msgget(0x2, 0x0) msgctl$IPC_STAT(r6, 0x2, 0x0) msgctl$MSG_INFO(r6, 0xc, &(0x7f0000000240)=""/174) [ 1592.200292][T27389] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1592.228158][T27391] device bridge13 entered promiscuous mode [ 1592.290135][T27391] device bridge14 entered promiscuous mode 22:35:51 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0x24, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000400", 0x39}], 0x1) 22:35:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:51 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x2, @dev={0xfe, 0x80, [], 0x29}}, {0xa, 0x0, 0x0, @mcast1}, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x5c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000000)={{0x4, 0x8}, 'port1\x00', 0xc9, 0x2, 0x7fff, 0x20, 0x9235, 0x5, 0xb2, 0x0, 0x33a39a49d224c865, 0xfff}) bind$inet6(r1, &(0x7f0000002640)={0xa, 0x4e22, 0x3ff, @local, 0x8}, 0x1c) 22:35:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xff}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'hwsim0\x00', 0x1}) [ 1592.472045][T27402] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1592.506581][T27404] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1592.516140][T27402] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:51 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000500", 0x39}], 0x1) [ 1592.779412][T27427] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1592.798280][T27427] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000600", 0x39}], 0x1) [ 1592.989955][T27430] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1593.009709][T27430] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000700", 0x39}], 0x1) 22:35:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1593.158864][ C0] net_ratelimit: 14 callbacks suppressed [ 1593.158872][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1593.170482][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1593.212395][T27433] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:52 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0x2a, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000040)) pwrite64(r0, &(0x7f0000000000)="1e10a6a6e827157f94033a5be59634b9da", 0x11, 0x23) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e22, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1]}, 0x5c) 22:35:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000800", 0x39}], 0x1) 22:35:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r2 = socket$unix(0x1, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:35:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="34000000100001045393", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:52 executing program 0: pkey_alloc(0x0, 0x1) r0 = socket$inet6(0xa, 0x2, 0x1a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1593.540633][T27448] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="34000000100001045393", @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000900", 0x39}], 0x1) 22:35:52 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0x30, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="34000000100001045393", @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1593.718890][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1593.724836][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1593.730764][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1593.736537][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1593.823331][T27473] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="340000001000010453930000000000", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:52 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc8, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000a00", 0x39}], 0x1) [ 1594.075363][T27489] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1594.358839][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1594.364701][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1594.370600][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1594.376390][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:35:53 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x2, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_buf(r3, 0x29, 0xd2, &(0x7f0000000000)="548eed4381f1a6f0607079ebd20271771fd10c2cc1bb011e687edc979f40aa88d6919265d1", 0x25) 22:35:53 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xca, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="340000001000010453930000000000", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000b00", 0x39}], 0x1) 22:35:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f00000001c0)={0x3, 'dummy0\x00', {0x72a8}, 0x7}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r4 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r6 = dup2(r5, r4) ppoll(&(0x7f0000000600)=[{r6, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$CAPI_CLR_FLAGS(r6, 0x80044325, &(0x7f0000000240)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x7a0, @rand_addr="59e0cbe757579eddb6c23dccd1d5d2d5"}, {0xa, 0x4e20, 0x5, @loopback, 0x6}, 0x7f, [0x9, 0x7, 0xe1, 0x7ff80, 0x40, 0x0, 0xff, 0x5f26]}, 0x5c) 22:35:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r2 = socket$unix(0x1, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:35:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="340000001000010453930000000000", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:53 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcb, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000f00", 0x39}], 0x1) 22:35:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="340000001000010453930000000000000000", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:53 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000001000", 0x39}], 0x1) 22:35:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x460640, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3}) 22:35:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="340000001000010453930000000000000000", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000001100", 0x39}], 0x1) 22:35:54 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x4e21, 0x0, @mcast1}}, 0x5c) 22:35:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r2 = socket$unix(0x1, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:35:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="340000001000010453930000000000000000", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:54 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcf, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000001200", 0x39}], 0x1) 22:35:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x341080, 0x0) write$tun(r1, &(0x7f0000000040)={@val={0x0, 0x4305}, @val={0x2, 0x4, 0x1, 0xb9a9, 0xfff9, 0x4}, @mpls={[{0x1, 0x0, 0x1}, {0x7}, {0x591c}, {0x8}, {0x3}, {0x8001, 0x0, 0x1}], @llc={@llc={0xfe, 0x1, "a2dd", "67ce07ec2bf8d5961305acd7a4a270586ac216dd6b40cfd5e6a2e4b96406d6d358e66faf303067a122be887f0adddd4e1d33311b152a16d58a254bfcc0adfc0ad913af7ce92687b892974b6e047f0b0443c113c10f0f4cdc78eb0b905f77b3b3606dd09ebfd00cf1c64a54502d966bcfaf338f9bc487d2a6665287f360c6e13cf7bdc80c3101f1f1b6b16012c2acd27e6ba64eed83d0761fc634cd1f17e4a04585d9831476111a8e8978c93ecf1909027c1dbc7b050b2a9afd0ef11cf1ccdf9b004434c87bf888fd3b93b371685972ad8756ba9018"}}}}, 0xff) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000001300", 0x39}], 0x1) 22:35:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x13, &(0x7f0000000000), &(0x7f0000000040)=0x4) 22:35:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="34000000100001045393000000000000000000", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:54 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xd0, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:54 executing program 3: setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f0000000000)='H-#$security$\x00', 0xe) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), 0x4) socket$inet6(0xa, 0x3, 0x3a) 22:35:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="34000000100001045393000000000000000000", @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0xe6aeaa84c0c9a803) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x80b00, 0x0) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x1) 22:35:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r2 = socket$unix(0x1, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:35:55 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xd1, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000001400", 0x39}], 0x1) 22:35:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="34000000100001045393000000000000000000", @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:55 executing program 3: ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1596.594738][T27621] validate_nla: 23 callbacks suppressed [ 1596.594749][T27621] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1596.604771][T27619] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:35:55 executing program 3: r0 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r4, r3) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9, 0x100) r5 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r6, r5) socket$packet(0x11, 0x2, 0x300) r7 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r8 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r8, r7) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x200500, 0x0) r9 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r10, r9) ppoll(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x2) r11 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r11, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1596.668854][T27619] __nla_validate_parse: 6 callbacks suppressed [ 1596.668883][T27619] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:55 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:55 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000004800", 0x39}], 0x1) [ 1596.907858][T27633] device bridge51 entered promiscuous mode 22:35:55 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:55 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1596.980715][T27642] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1597.006463][T27642] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1597.157394][T27648] device bridge52 entered promiscuous mode 22:35:56 executing program 0: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x40000) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000040)={{0x0, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e24, 0x4, 'wrr\x00', 0x10, 0xffffffff, 0x2c}, {@remote, 0x4e23, 0x3, 0x20, 0x8, 0x8}}, 0x44) 22:35:56 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r2 = socket$unix(0x1, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:35:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000004c00", 0x39}], 0x1) 22:35:56 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:35:56 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xd4, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1597.600464][T27660] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1597.626481][T27660] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1597.636673][T27663] device bridge53 entered promiscuous mode 22:35:56 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x2, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:56 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000040)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:35:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x34}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x28856) 22:35:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000006000", 0x39}], 0x1) 22:35:56 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x3, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1597.904305][T27687] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1597.928997][T27687] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1597.990843][T27688] device bridge54 entered promiscuous mode 22:35:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000006800", 0x39}], 0x1) 22:35:57 executing program 3: r0 = socket$inet6(0xa, 0x941f4bd8065b6da, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1598.173081][T27700] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1598.221214][T27700] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x28}, 0xffffffff}, {0xa, 0x0, 0x4, @mcast2}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x5c) 22:35:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r2 = socket$unix(0x1, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:35:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x28856) 22:35:57 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x4, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:57 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) recvfrom(r0, &(0x7f0000000000)=""/143, 0x8f, 0x10002, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x3, {0xa, 0x4e23, 0xfffffffb, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}}, 0x80) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0xfffffffe]}, 0x5c) 22:35:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000006c00", 0x39}], 0x1) [ 1598.518860][ C1] net_ratelimit: 16 callbacks suppressed [ 1598.518868][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1598.530377][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1598.536399][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1598.542231][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1598.558256][T27715] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1598.577119][T27713] device bridge55 entered promiscuous mode [ 1598.592358][T27715] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000007400", 0x39}], 0x1) 22:35:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x28856) 22:35:57 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x5, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1598.769927][T27730] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1598.816106][T27730] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1598.852635][T27733] device bridge56 entered promiscuous mode 22:35:57 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x6, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x28856) 22:35:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000007a00", 0x39}], 0x1) 22:35:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1599.019916][T27743] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1599.068968][T27743] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1599.152610][T27751] device bridge57 entered promiscuous mode 22:35:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:58 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x7, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000f000", 0x39}], 0x1) 22:35:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x28856) [ 1599.398901][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1599.404777][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:35:58 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000400)={0x6, 'rose0\x00', {0x4}}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x76}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(r4, &(0x7f0000000140)='io\x00') ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f0000000480)={[0x10000, 0xf000, 0x2, 0x1000], 0x6, 0xb0, 0x7}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x20, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x80}}, 0x20}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@loopback, 0x8, r6}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r7 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r8 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r9 = dup2(r8, r7) ppoll(&(0x7f0000000600)=[{r9, 0x180}], 0x1, 0x0, 0x0, 0x0) r10 = accept4$tipc(r9, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10, 0x80000) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x51dfcf38e699d0d9, 0x0) setsockopt$inet_tcp_TLS_RX(r11, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x304}, "6ee519d1a2ec6764", "cb485ca9a8fe36f923cfaf9371988ee0", "7a8006e5", "9a34a49c0c04b4f9"}, 0x28) getsockopt$TIPC_NODE_RECVQ_DEPTH(r10, 0x10f, 0x83, &(0x7f00000002c0), &(0x7f0000000300)=0x4) [ 1599.495932][T27766] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1599.534356][T27765] device bridge58 entered promiscuous mode 22:35:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = open(&(0x7f0000000000)='./file0\x00', 0x88400, 0x8) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000040)={0x1, 0x3f}) [ 1599.540497][T27766] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000003", 0x39}], 0x1) 22:35:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x28856) 22:35:58 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x8, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1599.768081][T27786] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:35:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000005", 0x39}], 0x1) [ 1599.870228][T27772] device bridge15 entered promiscuous mode [ 1599.944291][T27778] device bridge15 left promiscuous mode [ 1599.959025][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1599.964964][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1599.970854][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1599.976622][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:35:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000006", 0x39}], 0x1) 22:35:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000007", 0x39}], 0x1) 22:35:59 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:35:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000009e08", 0x39}], 0x1) [ 1600.464497][T27788] device bridge59 entered promiscuous mode 22:35:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000009", 0x39}], 0x1) 22:35:59 executing program 3: socket$inet6(0xa, 0x3, 0x3a) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x28800) sendmsg$unix(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000140)="43063925484ca880192192f3a0832f4637423350dcad57de6fb106b8e2c416bce34e050c8556c5a097c62786ccf8ac2dd7353f310a54e70977c63648d31dd6c33367cdbdc7ea4fbeee6bda6632e8cad5a48749a899aea6a57a74f65f9af19b16255b2fc459a5e4fd1905b400e3ce06c713cec900154b3a68e0fdf2328c28d7a0907e3e49191592ef208496eea69a8198ca", 0x91}], 0x1, 0x0, 0x0, 0x10080}, 0x8000) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=""/16, 0x10) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r2, r1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xa001, 0x0) r4 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r5, r4) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000380)=0x80) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7fff}, 0x3, [0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0xdfbe]}, 0x5c) 22:35:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x28856) [ 1600.773174][T27827] device bridge60 entered promiscuous mode 22:35:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x3, 0x3000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) 22:35:59 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xb, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:35:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000000a", 0x39}], 0x1) 22:35:59 executing program 3: socket$inet6(0xa, 0x3, 0x3a) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xff, 0x80000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000040)) 22:35:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x28856) 22:35:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000000b", 0x39}], 0x1) 22:36:00 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)=""/133, &(0x7f00000000c0)=0x85) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1601.093390][T27845] device bridge61 entered promiscuous mode 22:36:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:00 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xc, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000000f", 0x39}], 0x1) 22:36:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x28856) 22:36:00 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x6b60addd2984cb7f, 0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, r2) ppoll(&(0x7f0000000600)=[{r4, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000040)=r4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1601.437374][T27865] device bridge62 entered promiscuous mode 22:36:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000011", 0x39}], 0x1) 22:36:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:36:00 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xd, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:00 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x14000, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, r2) ppoll(&(0x7f0000000600)=[{r4, 0x180}], 0x1, 0x0, 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x19, &(0x7f0000000140)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001b00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={r7}, &(0x7f0000000100)=0x8) r8 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r10 = dup2(r9, r8) ppoll(&(0x7f0000000600)=[{r10, 0x180}], 0x1, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r10, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c7465720000000000000000cc36000000000000000000000000000000000500"/120], 0x78) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1d}}, {0xa, 0x0, 0x0, @remote, 0x400}, 0xfffe, [0x0, 0x0, 0x0, 0x9, 0xfffffffc, 0x9, 0x7]}, 0x5c) [ 1601.626075][T27881] validate_nla: 9 callbacks suppressed [ 1601.626086][T27881] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1601.710023][T27881] __nla_validate_parse: 8 callbacks suppressed [ 1601.710032][T27881] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1601.739903][T27886] device bridge63 entered promiscuous mode 22:36:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:36:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000012", 0x39}], 0x1) 22:36:00 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xf, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1601.932852][T27895] device bridge64 entered promiscuous mode [ 1601.946451][T27903] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1601.979011][T27903] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1602.093554][T27903] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1602.124974][T27903] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:36:01 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x10, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000013", 0x39}], 0x1) 22:36:01 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3e) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev, 0x2}, {0xa, 0x0, 0x8, @mcast2}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20f9263b, 0xffff]}, 0x5c) [ 1602.386904][T27915] device bridge65 entered promiscuous mode [ 1602.423399][T27924] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:01 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = dup2(0xffffffffffffffff, r1) ppoll(&(0x7f0000000600)=[{r2, 0x180}], 0x1, 0x0, 0x0, 0x0) recvmsg$can_j1939(r2, &(0x7f0000000340)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/19, 0x13}, {&(0x7f00000000c0)=""/151, 0x97}, {&(0x7f0000000180)=""/132, 0x84}, {&(0x7f0000000240)=""/86, 0x56}, {&(0x7f0000000400)=""/205, 0xcd}], 0x5, &(0x7f0000000500)=""/208, 0xd0}, 0x1008db87c8e59539) r3 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r5 = dup2(r4, r3) ppoll(&(0x7f0000000600)=[{r5, 0x180}], 0x1, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r6, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000000}, 0x800) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1602.458863][T27924] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1602.707963][T27938] device bridge66 entered promiscuous mode [ 1602.760530][T27943] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 22:36:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0xfffe, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000000)={0x2e, 0x6}) r4 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r6 = dup2(r5, r4) ppoll(&(0x7f0000000600)=[{r6, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$IMGETCOUNT(r6, 0x80044943, &(0x7f0000000040)) 22:36:01 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x13, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000014", 0x39}], 0x1) 22:36:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1602.953465][T27951] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1602.980376][T27950] device bridge67 entered promiscuous mode [ 1602.986423][T27951] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r0 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r0, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x500) r2 = socket$unix(0x1, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 1603.026577][T27958] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 22:36:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x80}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) 22:36:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000020", 0x39}], 0x1) 22:36:02 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x14, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1603.248132][T27968] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1603.287259][T27968] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1603.357069][T27971] device bridge68 entered promiscuous mode [ 1603.388033][T27973] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 22:36:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000003f", 0x39}], 0x1) 22:36:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r0 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r0, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x500) r2 = socket$unix(0x1, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:36:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x154, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x4}]}, 0x154}}, 0x28856) [ 1603.558875][ C0] net_ratelimit: 14 callbacks suppressed [ 1603.558884][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1603.570432][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1603.590292][T27987] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1603.618247][T27987] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1603.687635][T27986] device bridge69 entered promiscuous mode [ 1604.118830][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1604.124687][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1604.130573][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1604.136325][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:36:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x5c) 22:36:03 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1e}}}, 0x5c) 22:36:03 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x15, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000040", 0x39}], 0x1) 22:36:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x14c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_NET_NS_FD={0x8}]}, 0x14c}}, 0x28856) 22:36:03 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r0 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r0, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x500) r2 = socket$unix(0x1, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 1604.302270][T28006] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1604.346055][T28008] device bridge70 entered promiscuous mode 22:36:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000048", 0x39}], 0x1) 22:36:03 executing program 3: openat$audio1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio1\x00', 0x12dd01, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @local, 0xfffffffd}, 0x0, [0x0, 0x1, 0x0, 0x514e]}, 0x5c) 22:36:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:03 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x16, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x144, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}]}, 0x144}}, 0x28856) [ 1604.506283][T28016] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1604.687828][T28029] device bridge71 entered promiscuous mode [ 1604.758805][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1604.764739][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1604.770631][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1604.776401][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:36:03 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x18, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000004c", 0x39}], 0x1) 22:36:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x144, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}]}, 0x144}}, 0x28856) 22:36:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000000c0)={0x2, 0x4e, 0x1, 0x2, 0x4}) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev, 0x2}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x5c) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, r2) ppoll(&(0x7f0000000600)=[{r4, 0x180}], 0x1, 0x0, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000000)={0x41, 0x4, 0x2}, 0x10) r5 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r7 = dup2(r6, r5) r8 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r10 = dup2(r9, r8) r11 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r13 = dup2(r12, r11) r14 = accept$inet6(r10, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) r15 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r16 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r17 = dup2(r16, r15) ppoll(&(0x7f0000000600)=[{r17, 0x180}], 0x1, 0x0, 0x0, 0x0) r18 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r19 = syz_open_dev$sndseq(0x0, 0x0, 0x2000) r20 = dup2(r19, r18) ppoll(&(0x7f0000000600)=[{r20, 0x180}], 0x1, 0x0, 0x0, 0x0) r21 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r22 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r22, r21) r23 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r24 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r24, r23) ppoll(&(0x7f0000000180)=[{r9, 0x10}, {r12, 0x40}, {r14, 0x401}, {r17, 0x2}, {r20, 0x902}, {r13, 0x40}, {r22, 0x1}, {r23, 0x13}], 0x0, 0x0, 0x0, 0x1d9) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) 22:36:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x7, @mcast1}, 0x101, [0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3]}, 0x5c) memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r2, r1) r3 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r4, r3) r5 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r7 = dup2(r6, r5) ppoll(&(0x7f0000000600)=[{r7, 0x180}], 0x1, 0x0, 0x0, 0x0) r8 = dup2(r2, r7) geteuid() ppoll(&(0x7f0000000180)=[{r8, 0xa7c0}], 0x1, 0x0, 0x0, 0x0) r9 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r11 = dup2(r10, r9) ppoll(&(0x7f0000000600)=[{r11, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@initdev, @in=@multicast1}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) r12 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r14 = dup2(r13, r12) ppoll(&(0x7f0000000600)=[{r14, 0x180}], 0x1, 0x0, 0x0, 0x0) r15 = socket$nl_route(0x10, 0x3, 0x0) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r16, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r18, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x34}}, 0x0) sendmsg$nl_route(r15, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x20, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r18, 0x80}}, 0x20}}, 0x0) r19 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r20 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r21 = dup2(r20, r19) ppoll(&(0x7f0000000600)=[{r21, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r21, 0x0, 0x11, &(0x7f0000000680)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000780)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r14, 0x8916, &(0x7f00000007c0)={@remote, 0x6a, r22}) [ 1605.057764][T28051] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1605.087314][T28050] device bridge72 entered promiscuous mode 22:36:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000060", 0x39}], 0x1) 22:36:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x144, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_BROADCAST={0xc, 0x2, @local}]}, 0x144}}, 0x28856) 22:36:04 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x1b, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000068", 0x39}], 0x1) [ 1605.396734][T28070] device bridge73 entered promiscuous mode 22:36:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x140, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9f}, @IFLA_NET_NS_FD={0x8}]}, 0x140}}, 0x28856) 22:36:04 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x1e, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000006c", 0x39}], 0x1) [ 1605.606140][T28083] device bridge74 entered promiscuous mode 22:36:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x138, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_MASTER={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x138}}, 0x28856) [ 1605.865911][T28090] device bridge20 entered promiscuous mode [ 1605.984742][T28095] device bridge20 left promiscuous mode 22:36:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) r5 = getgid() write$P9_RGETATTR(r3, &(0x7f0000000140)={0xa0, 0x19, 0x2, {0x21, {0x10, 0x0, 0x8}, 0x5b, r4, r5, 0x80000000, 0x200, 0x6, 0xffffffff, 0xc7c, 0x100e, 0x5, 0x6, 0x1, 0xc9, 0xfff, 0x81, 0x8, 0x7, 0x7}}, 0xa0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:05 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x25, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1606.585205][T28100] device bridge75 entered promiscuous mode 22:36:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x8, @dev={0xfe, 0x80, [], 0x4}}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x5, 0x0, 0xfffffffc, 0x0, 0xff]}, 0x5c) 22:36:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000074", 0x39}], 0x1) 22:36:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x130, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_VF_PORTS={0x1c, 0x18, [{0x18, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca21eb5f78a76080caecacc27e76ea72"}]}]}, @IFLA_NET_NS_FD={0x8}]}, 0x130}}, 0x28856) 22:36:05 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1606.887520][T28124] validate_nla: 7 callbacks suppressed [ 1606.887528][T28124] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1606.943426][T28124] __nla_validate_parse: 3 callbacks suppressed [ 1606.943436][T28124] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1606.947457][T28123] device bridge76 entered promiscuous mode 22:36:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000007a", 0x39}], 0x1) 22:36:06 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x2, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x114, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_VF_PORTS={0xe0, 0x18, [{0x38, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "93bc099ad459581024215027d3d890d2"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'securityGPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x18}]}, {0x34, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a03461f78f00fa9b6d26074931538189"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x69}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e95d884ceb6c95967207f61bfa24163b"}]}, {0x70, 0x1, [@IFLA_PORT_PROFILE={0x1c, 0x2, '.[ppp0proc]{security(\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa7}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e80703c164f57a0b4da8cc802390aa26"}, @IFLA_PORT_VF={0x8, 0x1, 0xf6d}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "517720894f09373eb485223e9320d673"}, @IFLA_PORT_PROFILE={0x8, 0x2, 'lo'}]}]}, @IFLA_NET_NS_FD={0x8}]}, 0x114}}, 0x28856) [ 1607.188533][T28140] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1607.210554][T28138] device bridge77 entered promiscuous mode [ 1607.241063][T28140] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:06 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x3, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x34, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x1, @link_local}, @IFLA_NET_NS_FD={0x8}]}, 0x34}}, 0x28856) [ 1607.457711][T28152] device bridge78 entered promiscuous mode 22:36:06 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000089e", 0x39}], 0x1) 22:36:06 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@caif=@dgm, 0x0, 0x80400) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind(r1, &(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80) bind(r1, &(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'rose0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=@ipv4_deladdr={0x50, 0x15, 0x100, 0x70bd28, 0x25dfdbfc, {0x2, 0x1, 0x8, 0xfe, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x6a2, 0x0, 0x7, 0x9}}, @IFA_ADDRESS={0x8, 0x1, @remote}, @IFA_CACHEINFO={0x14, 0x6, {0x10001, 0x0, 0x5, 0x9}}, @IFA_ADDRESS={0x8, 0x1, @remote}]}, 0x50}, 0x1, 0x0, 0x0, 0x54014}, 0x10) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x800, 0x0) fanotify_init(0x0, 0x0) gettid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r5 = dup2(r4, r3) ppoll(&(0x7f0000000600)=[{r5, 0x180}], 0x1, 0x0, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x76}}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r5, &(0x7f0000000000)=r6, 0x12) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x23}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="b7859cb8eec705f2288a933d66593ae164c990a0028e6640c522b60bdfedb810", 0x20) r7 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r7, &(0x7f0000002640)=[{{&(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000440)=""/66, 0x42}, {&(0x7f00000004c0)=""/6, 0x6}], 0x3, &(0x7f0000000580)=""/81, 0x51}, 0x9}, {{&(0x7f0000000600)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x80, &(0x7f0000001b40)=[{0x0}, {&(0x7f0000000780)=""/143, 0x8f}, {&(0x7f0000001880)=""/217, 0xd9}, {0x0}, {&(0x7f0000001a80)=""/158, 0x9e}], 0x5}}, {{0x0, 0x0, &(0x7f0000002580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x100}], 0x3, 0x10022, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r7, 0x660c) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r8, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r8, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:06 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x45, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1607.619468][T28161] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1607.698928][T28161] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x28856) 22:36:06 executing program 3: r0 = dup(0xffffffffffffffff) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e000100060003480000000000000000f0", 0x39}], 0x1) [ 1607.836053][T28171] device bridge79 entered promiscuous mode 22:36:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) 22:36:06 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x60, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:06 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x3d) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1607.961115][T28184] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1607.989046][T28184] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000040", 0x39}], 0x1) [ 1608.146953][T28194] device bridge80 entered promiscuous mode 22:36:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYRES32], 0xfffffe0a) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1608.214585][T28206] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1608.246945][T28206] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:07 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x300, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1608.321707][T28191] bond0: (slave bond_slave_1): Releasing backup interface [ 1608.919010][ C1] net_ratelimit: 16 callbacks suppressed [ 1608.919018][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1608.930716][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1608.936873][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1608.942862][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1609.775038][T28191] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1609.798832][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1609.804698][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:36:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x8, @empty}, {0xa, 0x4, 0x0, @mcast1}, 0x0, [0x103]}, 0x5c) 22:36:08 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x4e21, 0x0, @mcast1}, 0x0, [0x8000, 0x0, 0x200000, 0x0, 0x0, 0x1, 0x2]}, 0x5c) 22:36:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000003", 0x39}], 0x1) 22:36:08 executing program 4: 22:36:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:08 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x4000, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1610.066617][T28238] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:09 executing program 4: 22:36:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x7, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x3]}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000400)={'nat\x00', 0x1000, "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"}, &(0x7f0000000000)=0x1024) [ 1610.122586][T28238] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:09 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x4500, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000ffff", 0x39}], 0x1) 22:36:09 executing program 4: 22:36:09 executing program 4: [ 1610.358845][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1610.364757][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1610.370694][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1610.376524][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1610.451898][T28264] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1610.468866][T28264] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x201, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in6={0xa, 0x4e24, 0x1, @empty, 0x3}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @rand_addr=0x10000}, @in6={0xa, 0x4e21, 0xff, @dev={0xfe, 0x80, [], 0x14}, 0x3}], 0x74) 22:36:09 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x6000, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:09 executing program 4: 22:36:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1610.706019][T28274] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1610.746149][T28274] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:09 executing program 4: 22:36:09 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x5c) 22:36:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:10 executing program 4: 22:36:10 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x2, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:10 executing program 4: [ 1611.182489][T28298] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1611.215935][T28298] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:10 executing program 0: socket$inet6(0xa, 0x3, 0x3a) 22:36:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1611.472019][T28309] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x53]}, 0x5c) 22:36:10 executing program 4: [ 1611.518128][T28309] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:10 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x3, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:10 executing program 4: 22:36:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r3, 0xc0285628, &(0x7f0000000040)={0x0, 0x4, 0x1a4, [], &(0x7f0000000000)=0x3c}) [ 1611.911343][T28329] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:10 executing program 4: [ 1611.952890][T28329] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:10 executing program 4: 22:36:10 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x45, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:11 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:11 executing program 4: 22:36:11 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x60, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1612.342230][T28352] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1612.391907][T28352] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:11 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x300, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:11 executing program 4: 22:36:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e23, 0x2, @mcast2}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e22, 0x101, @empty, 0x88}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x80000001}], 0x84) 22:36:11 executing program 4: [ 1612.846470][T28370] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1612.873303][T28370] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:11 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x4000, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:11 executing program 4: 22:36:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:12 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x4500, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:12 executing program 4: [ 1613.133564][T28389] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1613.168915][T28389] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:12 executing program 4: 22:36:12 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x6000, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:12 executing program 0: r0 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r2 = dup2(r1, r0) ppoll(&(0x7f0000000600)=[{r2, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000000)={{0x3, 0x2, 0x4, 0x0, 0xffff}, 0xff, 0xffff, 0x1ff}) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x10) ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000180)) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x2, 0x4, 0x3f, 0xd1}, {0x2, 0x6d, 0x5, 0x401}, {0x8, 0x7f, 0x7f, 0x80000000}]}, 0x10) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="cfa8fe10", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x19, &(0x7f0000000140)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001b00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x3c6c, 0x200, 0x5, 0x1000, 0x2, 0x9, 0xfffffff9, r7}, &(0x7f00000000c0)=0x20) r8 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r10 = dup2(r9, r8) ppoll(&(0x7f0000000600)=[{r10, 0x180}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_DBG_G_REGISTER(r10, 0xc0385650, &(0x7f0000000200)={{0x2, @name="7dc49987b9f101f11eb11fcdc76ae543e7670e238613125a932ac75dab35f8ff"}, 0x8, 0x1}) ioctl$USBDEVFS_CONNECTINFO(r5, 0x40085511, &(0x7f00000001c0)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x5c) 22:36:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1613.755633][T28408] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:12 executing program 4: [ 1613.801291][T28408] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, r2) ppoll(&(0x7f0000000600)=[{r4, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$TUNSETGROUP(r1, 0x400454ce, r5) 22:36:12 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x44cb2, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1613.958827][ C0] net_ratelimit: 14 callbacks suppressed [ 1613.958836][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1613.970478][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:36:12 executing program 4: 22:36:13 executing program 4: [ 1614.125800][T28436] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1614.151002][T28436] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1614.518898][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1614.524767][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1614.530693][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1614.536593][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:36:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:13 executing program 4: 22:36:13 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x1000000, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1614.709677][T28453] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1614.772691][T28453] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0xf}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:13 executing program 4: 22:36:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x400}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r1, 0x3, 0x20}, 0xc) 22:36:13 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x2000000, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:13 executing program 4: 22:36:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) sched_getattr(0xffffffffffffffff, &(0x7f0000000000)={0x30}, 0x30, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x7]}, 0x5c) socket$kcm(0x29, 0x5, 0x0) [ 1615.094735][T28476] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:14 executing program 4: [ 1615.138023][T28476] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1615.158875][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1615.164722][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1615.170641][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1615.176454][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:36:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 22:36:14 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x3000000, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:14 executing program 4: 22:36:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xe8) r5 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r6, r5) r7 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r8 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r9 = dup2(r8, r7) ppoll(&(0x7f0000000600)=[{r9, 0x180}], 0x1, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) keyctl$chown(0x4, 0x0, r10, r11) r12 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x76}}, r12, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r15 = dup2(r14, r13) ppoll(&(0x7f0000000600)=[{r15, 0x180}], 0x1, 0x0, 0x0, 0x0) fstat(r15, &(0x7f0000006080)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0xa, 0xe9c8a4bfae799d4d, 0xff, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = socket$unix(0x1, 0x6, 0x0) r19 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r20 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r20, r19) r21 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r22 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r23 = dup2(r22, r21) ppoll(&(0x7f0000000600)=[{r23, 0x180}], 0x1, 0x0, 0x0, 0x0) r24 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r25 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r25, r24) r26 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r27 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r27, r26) r28 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r29 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r29, r28) r30 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r31 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r31, r30) r32 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000006400)='tasks\x00', 0x2, 0x0) r33 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r34 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r34, r33) r35 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r36 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r37 = dup2(r36, r35) ppoll(&(0x7f0000000600)=[{r37, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r37, 0x540f, &(0x7f0000006440)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006480)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000006580)=0xe8) getresgid(&(0x7f00000065c0), &(0x7f0000006600)=0x0, &(0x7f0000006640)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006680)=0x0) r42 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r43 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r43, r42) fstat(r42, &(0x7f00000066c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000006740)=0x0) r46 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r47 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r48 = dup2(r47, r46) ppoll(&(0x7f0000000600)=[{r48, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r48, 0x29, 0x22, &(0x7f0000006780)={{{@in6=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000006880)=0xe8) getresgid(&(0x7f00000068c0), &(0x7f0000006900)=0x0, &(0x7f0000006940)) r51 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x76}}, r51, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) keyctl$chown(0x4, 0x0, r52, r53) fstat(0xffffffffffffffff, &(0x7f0000006980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r55 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x76}}, r55, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000006a00)=0x0) r57 = gettid() lstat(&(0x7f0000006a40)='./file0\x00', &(0x7f0000006a80)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000006b00)={0x0, 0x0, 0x0}, &(0x7f0000006b40)=0xc) r60 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x76}}, r60, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r61 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x76}}, r61, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000007cc0)={0x80200800, &(0x7f0000006b80), &(0x7f0000006bc0), &(0x7f0000006c00)=0x0, 0x0, 0x0, &(0x7f0000006c40)=""/4096, 0x1000, &(0x7f0000007c40)=""/37, &(0x7f0000007c80)=[0xffffffffffffffff, r60, r61], 0x3}, 0x50) r63 = getuid() r64 = timerfd_create(0x0, 0x0) fstat(r64, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r65) sendmsg$netlink(r3, &(0x7f0000007ec0)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff, 0x10000}, 0xc, &(0x7f0000006380)=[{&(0x7f0000000040)={0x1b0, 0x2a, 0x100, 0x70bd25, 0x25dfdbff, "", [@generic="0dc9de5d98f4b795214ca8d1a207bc8ad385192170b88ebf0d27d71ac60151133b1a572f55cd10ead1509a6f9930e10f5daaf290f403c0a07ea5ffaa8dbdbb2141d0f2ce4a291206ac6c646367b38fd451bb1ddf665d8f45e62075078b85d5f45d1a387d285235e30590a00dca4ce499534246fb02b03f33a438585cc8509f831511e7cf1f33d292a5f789d613af16d366e5d78bec825a708c", @generic="4ac329654d092a478b00f56051d51644de5b792019a5dcd55683675bb8d863c3fb4b8efabdfb5b1a1b8694c138241ad6bdd990b89ed91c843293151a2af15811606c5d836f906898c073372afcb42d65bd8e6b705e54ccc7ca6f391fa296dd13e8243e8e9ca4e34bf39d14f37aadc7eb399b8bb4d78254e947b1d277370a782a5d147af0fa6a24edeac12541596a91c0d6e666f3eca5dfdd73096e35fdcff01f178578ff9b6c018e5e7636df5832bfd32636c7395521924035ee43271cd8be69e1d488e36cd9bdb7ff627986e6e839442d6af00d3f427b4ff3c5562590714d85d0642807cfc283a577", @generic="9e78960b1b447a6c2034371f2712a70ec89584d7ed3b481d3bae7f"]}, 0x1b0}, {&(0x7f0000000400)={0x1110, 0x3b, 0x2, 0x70bd2d, 0x25dfdbfb, "", [@generic="e58785cec035dfb543a4e29ca5c5d9a76a61aa1d04b3e22ddc5d913346942ec484b56ee0f49488a3db690feb60af8d284d3cd06704afa935d56d32dfd1b1d6242884594e5e4e96d5f71949ffbb5b27fa1d33e456f215b4eb01e3da63d800ae37e952bc5b032d789820051ffc627cbbbf5bf295f84aaa7a1d51376b782bceceef5a2b34c15199fd3fcd2d4e7c1bfb6b566843be22cd4c974501291bd0d503347f2b35ec846473c4a961719e5f5c6886fa2e6f8d2186adbd0300467f7d2c289772d01c04af28752ae1e7b5b17385b2c25278a938d90bc09d2324c8d766bc3c120381493a18537b2cf9eb8a7c1099d8598ee66c3b25", @nested={0x100c, 0x4, [@generic="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", @typed={0x8, 0x30, @fd=r0}]}]}, 0x1110}, {&(0x7f0000001540)={0x2678, 0x14, 0x18, 0x100, 0x25dfdbfd, "", [@nested={0x88, 0x23, [@generic="e54316bdbe5803d0e66c9b0fc3e454e2ad0572f7b0866af71ef168d6e2af1aaf07f42a004938bd36cb51dbc2eb5b457799bf2f9b4b2a4162d768ebceb54fb4b858a9d34c04f858025717a54aa2054e43f28442ea4a80ed7a8be51467ac6b3e0103c7b5e248f456181220fa77b6bfd57e", @typed={0xc, 0x6c, @u64=0x87}, @typed={0x8, 0x5b, @uid=r4}]}, @typed={0xc, 0x77, @u64=0x100000001}, @typed={0x4, 0x12}, @nested={0x7c, 0xe, [@generic="d37953344f60868c51f66a4331b4f994d4c084e5c54f94c7061f4425d0ec9f6fbe3b1f135953d419a7d2b6a8caeb65d880a4ce714b60c8f6b98ddae31689540323073a3706dd8fbd0d2cd554cc27ea44b6660420582fefa6bc5206615035b9d1fd8987bd8e5d0b81970e60a73ab8cf378c79aabcf5bd31"]}, @nested={0x1d0, 0x53, [@typed={0xc, 0x77, @u64=0x7}, @typed={0x14, 0x2c, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic="bfdcb492841ec3365799c0ed4db6d153021bf7433339fd2e761324b2afa2025ce4ef3ca63374d2b2f3d5f94c694680e665375ff7020c28d27ae22555abbbd0d29c90507b64cd8cbb0e2295156ec878f3ef7b7f3360a6c9dfe334cedb4366df01e9d90b26c01cf3c2a1d9ef2235ff50d1e4cfe020", @typed={0x8, 0x8e, @fd=r5}, @generic="e0c9cfebb9431b20cf3f7d5a1add3d1c73145472655ab3a125e1ede9f1f40a099442553616a21cca6c14f12eb7f823b91327b1b5c9608c6df0222fc24643935d46b5285cf377bddee90d615adcdb12d106d9f9ceea0a10d4132ce31f609d9b59", @generic="64c4c12b21a3609995a6b02e5e5a8aae99320be34b195beaa3502c344fc771c98c8e5118676bbedda1760d99cd9873472032a86cebeffae66bdb1e5080d7", @generic="331d30b939298d9dc294025c9bbee5924e63b9f4b4541b69b8468d9481f54fe854343513049a301ec54be6e1f4fcce6b8859e1dd289ef47ccd17f35bea577761a845800f004b976ff5da53e1ab70d0d2271136871b0de1624e5028f312e3623e345928e485b8a079fe895e7b8d98ee92db8dfa3deaf08c38cce6c506529791a1a19b84773f2a3d5ab6e2992e863a0446748f"]}, @typed={0x14, 0x41, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @typed={0x64, 0x13, @binary="5b23dc186a17abf8146b264045ac92e47378ce81f1d655c4b5e9966a466a91e44869d6e80b07630245ad289e04de09f25d132b002fa0e6350f61ccd4acf8e8c6db1f9af69a06b026bb1e64ad99d307aaf175fb60bf54f57c93bda8d8d21a"}, @nested={0x209c, 0x23, [@generic="c3edd26ac128e31d6ad6d7d9d18698fb162e0d5f6a3718d790b1d07f275ddbdf75c10f92496720ca35756a57ae13fe6214a3aad351c4cccbbad22f803d36d4cfb1894c", @typed={0x14, 0x36, @ipv6=@ipv4={[], [], @remote}}, @typed={0x8, 0x59, @fd=r0}, @generic="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", @generic="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", @typed={0x18, 0x49, @str='em1vboxnet0}system\x00'}, @generic="4b4b9ace6c60a84690826df317a5178a731de3af20", @typed={0xc, 0x7, @u64=0x3}]}, @nested={0x270, 0x67, [@generic="543442f9e92b7c5d882b2a28b69008ed6dc9e8d8dbcddd71d0308432fd0230944c55185646cd5e72611dfe7ad50ff01e92ce601319bc52cb833edbd5f883409ff8ae480e8c3d4e340d76ce4972f500b855309e5e68e2901f78e5b340927b771e40fa913aad99a7fb11d0143fde2d51b5f3e52b92e5dcf583a122d1ecf6102e8b53ad1e21f3202ebb48516ab6", @typed={0x8, 0x6c, @fd=r9}, @generic="8f0e9b9af22f5654e79f83e68c2d051c2266c60c8a540c3d5eadbab81fb700b3c760798a702b8d5cc61c32c54ffb2f02e334b2ca4e2c46ee91b497113f3badddf8976db4db4838518ba6be175c2f4c746cd86b6a3b215b56aafeabc82b22dfaf36a71ff9a9aad3736755c7113e0ffdfa5b45e6ad958f306c909c925503560e711f6478b15b5e06c89198143ed2bf76b0fc3048f5e6da2b9c977b2be578fa717ed218272fdefff6e636959d9b0b1d3725bc2b9e20cd4dbb9d5d11b1ed3774542a9de716ccb27a4c3c", @generic="43d2f48817bf28e44901d24f179a8041348a5182ed90b6e89c0cc614d8eb6261a455fdfc28acb4308b84c3eece6b4c5856920c43321866be6feb434b2ee4d81e833244039e98f72b8681f5cb4c3c91e7e1dc9b5cda5f8ff4244e1953d24776e81bf2186addacd909216bb21c33377a8b5b5bba156a9f3e602955cb0dd448a34d016fb30553d0041e1b68915a9b7790a1ee4aa27d777a23", @generic="869f9b098943dbab60364c3ed79ae6b6337dc2014b0afb432ae6884406570156f1b382fe43c7cce1a1adfa4971d9293c1c1e4be7229cba05b7a976f89234181ce71576e1581fe3bac72bd7d1f2b933ba73fbcda9d40206a0266b7ac1773ae03926e1", @typed={0x14, 0x5, @ipv6=@loopback}]}]}, 0x2678}, {&(0x7f0000003bc0)={0xb8, 0x1d, 0x4, 0x70bd26, 0x25dfdbfb, "", [@typed={0xc, 0x38, @u64=0xe41e}, @generic="609005459bf39d3ad2358fa94d3893339691e346217078f8bd5f724f22f38bfb9113f918a53331a474ae754d41d0758f01a56a73cd9dde71a8f2aded2151013fa122ceb184aa82a564dfb2883940f36e5b15e265ca1aff7c94616b9e104bbfe6423afb762e1b4fbea0dd4030444a6fc4fd48c3426293ab14fdadb8610b12439043df34115af7722dc9bcf7d0a52e9cdf4537955407088e7ea592"]}, 0xb8}, {&(0x7f0000003c80)={0x2348, 0x26, 0x102, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x1178, 0x81, [@generic="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", @generic="7b19120e2b64d2438a5f3a6418e8874cf13cbe8ebbbf2648fdc8586c349931ff8f1f50c79f25d5dc5f50d7856b622eb7cd5daa6449e73cc70d49e8dbc14d13ac9504740332e88436e743f71712c3cfa97f1d2b89b08a72db269790fff82639acc42f727fb3f66530c52404cc64e73a", @typed={0x8, 0x62, @ipv4=@loopback}, @generic="9d82f75169c6d44527ffedc9f5a83d8682235b60ee1e5d1810706f19603652bf6c8ef5fedfa31de7d1ca3eeb0fe62106331859a885223ce2f7b914d669bdb2a9b4d42ff3b0deba9f647baac087cded1e9dbaddabd8a9c287cf804ac2028621651ae72088b2b5bb8b5ebdf4af6eac64cd46991601e24834c9695f5e63a5bf1d714e9831c6e32ab133ca7ad8206234", @typed={0x10, 0x2a, @str='}[keyring\x00'}, @generic="b7d3f569ef65a11c6c7ae9d576ae7fc76a53f1edba695a718260e73ab9ecad26651d466169f2f92cc8922435aff8a60faacad27fc35c6ea9bd7263cfd9aa664c21677bb7d91e5fa436b7fb80ab64e1f1d9e4da98eb2d", @typed={0x8, 0x1c, @fd=r0}]}, @nested={0x11c0, 0x5a, [@generic="5f0c45504766f450316c1112d91c40fc861a99d7832d40625a391558b02ae9700cd1a7d7342d2a8d37cdc81b89784013f0dfe0cd66f50ed46a89fafd", @typed={0x8, 0x10, @uid=r10}, @generic="14f23d72b9284b28de4300079bedfb1a8a11bc3e80f6d1f5c4a36f04d76e5052103543d0424dcd2038df2164ffcd69a400c9c5f660977536da38b9cf08fc19e44a04e8393d1a8eb0fb8dc367cde18464", @generic="813d1fc42f98424984624ae3981478946580731419c246af068a85134f1f81094255fe6cb344022aebbed8a1e387750c0135", @generic="cd468b9304c5591151378c695df08afed5dad3068d056e1d87a6fd97f21a68cc6fc3c77a53faccd23e9306af098777c03f1dc282e6fa18c95fb253ec22eb81dfc6b660f3cc0dbc1f77d6d554940859b763288261505e337a922ff1bfb372b54da97788a1460ef1d14e83196e6eada62201f8248d9ca7fa0bc66850fd378756acf6227f0a6254c7e0968409c216dfc8a9c4968dfa6828d7b0a9feb059f5f699c58264003309ade1c7e9489758e29f23c00c46fdfef2d2397a0e2893cd3e0e4565525d62e87fb77e80f627216316d20a058d4764f112fc9e9f922b92528909fcd0423494d1922211c5", @generic="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", @typed={0x8, 0x2f, @ipv4=@rand_addr=0x603}, @typed={0x4, 0x21}]}]}, 0x2348}, {&(0x7f0000006000)={0x74, 0x39, 0x100, 0x70bd2a, 0x25dfdbfb, "", [@generic="daadd37a76509da66814da99a3df03cca330aa01cdf761716bce86614ebc907f5d55769e65a2173c9a25beba82de8842b65249a0451ce9af95e1eccd6353e7c0290585bdcefcfdaeb661a8d2f5ab4f4a3b73450b439b6ed7a937488aec71b183bf55"]}, 0x74}, {&(0x7f0000006100)={0x25c, 0x29, 0x200, 0x70bd2b, 0x25dfdbfc, "", [@typed={0x8, 0x6, @pid=r12}, @typed={0x8, 0x4e, @ipv4=@broadcast}, @nested={0x1bc, 0x76, [@generic="0b77b4bc9766299c50a11794299884f9c6325a0526beb1bcde1f9960e0f3c1fae8314f5d4befcec14d659789cf69d834a04bcd9d2330ecca44a2bc8a60c9de6e3e17a3d90608725fedbed9bc1229a9319bc8062fab36c62dd7d91eee6d6f62c478ec289da15b91e06d20e9989ac7bae7152042d2", @typed={0x8, 0x34, @u32=0x3}, @generic="3db80b7f878a793004b265c8247f2c6dd819224deb8729e24af492e13b7365433f05b209306d84063a120adaba4a8e6568a4a69792cec881b08e63fcacb3fc4245c0", @generic="45abb0dbf08cea1e3361639b5bf2edd4aa714047b10b742ca327750af4b729a801", @typed={0x8, 0x31, @u32=0xd3}, @typed={0x8, 0x55, @u32=0x100}, @generic="b11753ca87e8b71a88557a2f2e42196654f3933a541dbb46a04a3678be213b6eef13df9d40ba1d7a99085c830c157793b9e16888e09f354653b5d50da49d7fb8a2658c822e4ebc12", @generic="48fd2df44b89b458fdc7467fa7d4fba42a459ccb404270163a1f021ffa62af4a122015f59e395d64685e9c75068a50c589aaa0059a8b63182e7fdb828094e431e60774be9d68d06a9926d4fab7d646e12d0555e1053e56abe329632aac081b8b31c21d5de26336529c4b2cd469e0ade6583ed6eab462ab9840", @typed={0x8, 0x18, @uid=r16}]}, @typed={0x80, 0x39, @binary="39c0f1b395ac3d64aed222c81f2824e66ba2002c69114711123129dc2ffbbfbc8cff7fdf81c167d5b53fc3c6c651d41333d6259cf6ed5885e2ff8db2d5726e77fc23cde41386ceddf1d69baa9bed9d811bbce6b52378301b530451d5ece04c97d0d7cc2a233663b5fe4d00da0c38274df22868fef18ff6be7803945e"}]}, 0x25c}], 0x7, &(0x7f0000007d40)=[@rights={{0x14, 0x1, 0x1, [r17]}}, @rights={{0x38, 0x1, 0x1, [r18, r19, r0, r23, r25, r0, 0xffffffffffffffff, r0, r26, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [r28, 0xffffffffffffffff, r30, r32, r34]}}, @cred={{0x1c, 0x1, 0x2, {r38, r39, r40}}}, @cred={{0x1c, 0x1, 0x2, {r41, 0x0, r44}}}, @cred={{0x1c, 0x1, 0x2, {r45, r49, r50}}}, @cred={{0x1c, 0x1, 0x2, {r51, r52, r54}}}, @cred={{0x1c, 0x1, 0x2, {r55, r56}}}, @cred={{0x1c, 0x1, 0x2, {r57, r58, r59}}}, @cred={{0x1c, 0x1, 0x2, {r62, r63, r65}}}], 0x158, 0x4801}, 0x80) 22:36:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8000, 0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, r2) ppoll(&(0x7f0000000600)=[{r4, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f00000000c0)={{0x2, 0x4, 0x1, 0x5, 'syz1\x00', 0x200}, 0x3, 0x2, 0x0, r5, 0x3, 0x7, 'syz0\x00', &(0x7f0000000080)=['vboxnet0,ppp0\x00', '@system%\x00', '\xd2em1,\x00'], 0x1d, [], [0x8fc, 0xd051, 0x62ba, 0x8001]}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x20000000, @mcast1}, 0x0, [0x2, 0x0, 0x3, 0x6]}, 0x5c) 22:36:14 executing program 4: [ 1615.719256][T28501] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1615.764351][T28501] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:14 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x40000000, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:14 executing program 4: [ 1616.006742][T28528] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:15 executing program 4: 22:36:15 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x45000000, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1616.048911][T28528] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 22:36:15 executing program 4: 22:36:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:15 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x60000000, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x8d000) write$P9_RCLUNK(r1, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) 22:36:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = add_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='/)vboxnet0{securityppp1\x00', r1) 22:36:15 executing program 4: 22:36:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:15 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0xb24c0400, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xdc2017e9f2d8d38a, 0x9, 0xfffc, 0xf4}, 0x20) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, r2) ppoll(&(0x7f0000000600)=[{r4, 0x180}], 0x1, 0x0, 0x0, 0x0) r5 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r7 = dup2(r6, r5) ppoll(&(0x7f0000000600)=[{r7, 0x180}], 0x1, 0x0, 0x0, 0x0) sendfile(r4, r7, &(0x7f00000000c0)=0x5, 0x2c) r8 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r10 = dup2(r9, r8) ppoll(&(0x7f0000000600)=[{r10, 0x180}], 0x1, 0x0, 0x0, 0x0) connect$caif(r10, &(0x7f0000000080), 0x18) [ 1617.013352][T28565] validate_nla: 1 callbacks suppressed [ 1617.013362][T28565] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:16 executing program 4: [ 1617.073076][T28565] __nla_validate_parse: 1 callbacks suppressed [ 1617.073084][T28565] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:16 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0xc3ffffff, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 22:36:16 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r5 = dup2(r4, r3) ppoll(&(0x7f0000000600)=[{r5, 0x180}], 0x1, 0x0, 0x0, 0x0) r6 = socket$packet(0x11, 0x939bd59479c005c, 0x300) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000040)={r6, 0x0, 0x48f, 0x8}) r7 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r7, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r7, 0x541b, &(0x7f0000000000)) 22:36:16 executing program 4: 22:36:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:16 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0xffffffc3, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:16 executing program 4: [ 1617.623746][T28602] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1617.653405][T28602] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:16 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:16 executing program 4: 22:36:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1617.920030][T28620] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1617.941830][T28620] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x9}, 0x28, 0x2) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 22:36:17 executing program 4: 22:36:17 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x2], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) 22:36:17 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r3, 0x116, 0x7f, &(0x7f0000000000)=0x3f, 0x4) 22:36:17 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x3], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, 0x0, 0x0, 0x0, 0x0) sched_getaffinity(0x0, 0x0, 0x0) [ 1618.601030][T28647] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1618.656463][T28647] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:17 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x45], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x9) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="c69a6b4c3e77", [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xfffe, 0x0, 0xfffe}}}}}}}, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) keyctl$invalidate(0x15, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setresgid(0x0, 0x0, 0x0) lchown(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r2 = creat(0x0, 0x1) write$binfmt_script(r2, &(0x7f0000001340)=ANY=[], 0x0) close(r2) creat(&(0x7f0000000000)='./file0\x00', 0x1) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpid() r3 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r4, 0x0) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r5) ptrace$setopts(0x4206, r5, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x1) r6 = creat(0x0, 0x1) write$binfmt_script(r6, &(0x7f0000001340)=ANY=[], 0x0) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r7) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001340)=ANY=[], 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRESHEX=0x0, @ANYBLOB="631b05271540aeee7e735ea09125ca89bed48454e4219f677c7eabd00db8038232e090a59ea3070081b583fa2e225f0b0fa67eae1347c914afe56d96161189c28e"], 0x6c) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r8, 0x0) lchown(&(0x7f00000000c0)='./bus\x00', 0x0, r8) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001340)=ANY=[], 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001340)=ANY=[], 0x0) close(0xffffffffffffffff) creat(&(0x7f0000000000)='./file0\x00', 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004600)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {0x0, r10}}}], 0x20}], 0x1, 0x0) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001340)=ANY=[], 0x0) close(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) setgid(r11) r12 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r12, 0x8982, &(0x7f0000000100)={0x6, 'tunl0\x00', {0xff}, 0xa88e}) 22:36:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:17 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x37) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x80000001]}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000080)={0xff, 0xced, 0x4, 0x3}) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000040)={r4, 0xcd}) r5 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r7 = dup2(r6, r5) ppoll(&(0x7f0000000600)=[{r7, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETINTERFACE(r7, 0x80085504, &(0x7f0000000000)={0x4, 0x5}) 22:36:17 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x60], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1618.957715][T28672] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1618.975566][T28672] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) [ 1619.232956][T28691] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1619.248998][T28691] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1619.318825][ C1] net_ratelimit: 16 callbacks suppressed [ 1619.318835][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1619.330537][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1619.336412][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1619.342258][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:36:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) 22:36:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xf8e5c7b249324313, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0x200, 0x4) 22:36:18 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:18 executing program 4: mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffff) 22:36:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1619.570405][T28706] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x10, @loopback}], 0x10) [ 1619.627616][T28706] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:18 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x2], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:18 executing program 3: r0 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r2 = dup2(r1, r0) ppoll(&(0x7f0000000600)=[{r2, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x8) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x8000, @dev}, {0xa, 0x0, 0x100, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x200]}, 0x5c) 22:36:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x8001, @loopback}, {0xa, 0xfffd, 0x0, @mcast1}, 0x0, [0x0, 0xfffffffc, 0xe2d0, 0x1f, 0x1000]}, 0x5c) 22:36:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1620.198815][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1620.204692][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:36:19 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x3], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1620.311508][T28745] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1620.338880][T28745] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) 22:36:19 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x45], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:19 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x60], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1620.573931][T28763] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1620.606004][T28763] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:19 executing program 3: r0 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r2 = dup2(r1, r0) ppoll(&(0x7f0000000600)=[{r2, 0x180}], 0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x44) ioctl$TIOCCONS(r2, 0x541d) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1620.758802][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1620.764760][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1620.770662][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1620.776483][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:36:19 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1620.839773][T28778] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x9) [ 1620.883414][T28778] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:19 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x2], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:20 executing program 4: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0x15, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x34}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x28856) 22:36:20 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x3], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:20 executing program 5 (fault-call:7 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1621.496473][T28813] device bridge81 entered promiscuous mode [ 1621.538661][T28817] FAULT_INJECTION: forcing a failure. [ 1621.538661][T28817] name failslab, interval 1, probability 0, space 0, times 0 [ 1621.590882][T28817] CPU: 1 PID: 28817 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 1621.599640][T28817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1621.609712][T28817] Call Trace: [ 1621.613023][T28817] dump_stack+0x197/0x210 [ 1621.617380][T28817] should_fail.cold+0xa/0x15 [ 1621.622024][T28817] ? fault_create_debugfs_attr+0x180/0x180 [ 1621.627851][T28817] ? ___might_sleep+0x163/0x2c0 [ 1621.632748][T28817] __should_failslab+0x121/0x190 [ 1621.637707][T28817] should_failslab+0x9/0x14 [ 1621.642228][T28817] kmem_cache_alloc_trace+0x2d3/0x790 [ 1621.647630][T28817] alloc_pipe_info+0x10e/0x4f0 [ 1621.652488][T28817] splice_direct_to_actor+0x80e/0xa30 [ 1621.657869][T28817] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1621.663448][T28817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1621.669694][T28817] ? do_splice_to+0x180/0x180 [ 1621.674381][T28817] ? rw_verify_area+0x126/0x360 [ 1621.679242][T28817] do_splice_direct+0x1da/0x2a0 [ 1621.684098][T28817] ? splice_direct_to_actor+0xa30/0xa30 [ 1621.689657][T28817] ? rw_verify_area+0x126/0x360 [ 1621.694531][T28817] do_sendfile+0x597/0xd00 [ 1621.701667][T28817] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1621.706956][T28817] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1621.713204][T28817] ? fput+0x1b/0x20 [ 1621.717023][T28817] __x64_sys_sendfile64+0x1dd/0x220 [ 1621.722486][T28817] ? __ia32_sys_sendfile+0x230/0x230 [ 1621.727788][T28817] ? do_syscall_64+0x26/0x790 [ 1621.732466][T28817] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1621.737771][T28817] ? trace_hardirqs_on+0x67/0x240 [ 1621.742803][T28817] do_syscall_64+0xfa/0x790 [ 1621.747315][T28817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1621.753205][T28817] RIP: 0033:0x45a849 [ 1621.757104][T28817] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1621.778728][T28817] RSP: 002b:00007f707352dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1621.787146][T28817] RAX: ffffffffffffffda RBX: 00007f707352dc90 RCX: 000000000045a849 [ 1621.795150][T28817] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1621.803132][T28817] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1621.811125][T28817] R10: 0000000000000500 R11: 0000000000000246 R12: 00007f707352e6d4 [ 1621.819098][T28817] R13: 00000000004c91ba R14: 00000000004e0dd0 R15: 0000000000000005 22:36:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:20 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x45], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000000)={0x1, 0x0, 0x2005, 0x5, 0x2, {0x40, 0xdc0}, 0x1}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:20 executing program 3: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x76}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip_vs_stats\x00') ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000040)={{0x2, 0x4e23, @multicast2}, {0x306, @dev={[], 0x1f}}, 0x48, {0x2, 0x4e23, @multicast2}, 'hwsim0\x00'}) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r5 = dup2(r4, r3) ppoll(&(0x7f0000000600)=[{r5, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_int(r5, 0x29, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:20 executing program 4 (fault-call:6 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) [ 1621.998438][T28832] device bridge82 entered promiscuous mode 22:36:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000ffff", 0x39}], 0x1) [ 1622.040480][T28837] FAULT_INJECTION: forcing a failure. [ 1622.040480][T28837] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.094175][T28837] CPU: 0 PID: 28837 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1622.102909][T28837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1622.113096][T28837] Call Trace: [ 1622.116421][T28837] dump_stack+0x197/0x210 [ 1622.120778][T28837] should_fail.cold+0xa/0x15 [ 1622.125385][T28837] ? release_sock+0x156/0x1c0 [ 1622.130091][T28837] ? fault_create_debugfs_attr+0x180/0x180 [ 1622.135914][T28837] ? ___might_sleep+0x163/0x2c0 [ 1622.140800][T28837] __should_failslab+0x121/0x190 [ 1622.145760][T28837] should_failslab+0x9/0x14 [ 1622.150279][T28837] kmem_cache_alloc_node+0x268/0x740 [ 1622.155613][T28837] __alloc_skb+0xd5/0x5e0 [ 1622.156193][T28843] validate_nla: 4 callbacks suppressed [ 1622.156202][T28843] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1622.159952][T28837] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1622.159974][T28837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1622.159993][T28837] ? netlink_autobind.isra.0+0x223/0x300 [ 1622.160016][T28837] netlink_sendmsg+0xa1b/0xea0 [ 1622.160039][T28837] ? netlink_unicast+0x7d0/0x7d0 [ 1622.160055][T28837] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1622.160073][T28837] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1622.160088][T28837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1622.160102][T28837] ? security_socket_sendmsg+0x8d/0xc0 [ 1622.160115][T28837] ? netlink_unicast+0x7d0/0x7d0 [ 1622.160131][T28837] sock_sendmsg+0xd7/0x130 [ 1622.160150][T28837] ____sys_sendmsg+0x753/0x880 [ 1622.168063][T28843] __nla_validate_parse: 4 callbacks suppressed [ 1622.168073][T28843] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1622.173679][T28837] ? kernel_sendmsg+0x50/0x50 [ 1622.173696][T28837] ? __fget+0x35d/0x550 [ 1622.173712][T28837] ? find_held_lock+0x35/0x130 [ 1622.173742][T28837] ___sys_sendmsg+0x100/0x170 [ 1622.173764][T28837] ? sendmsg_copy_msghdr+0x70/0x70 [ 1622.173780][T28837] ? __kasan_check_read+0x11/0x20 [ 1622.173798][T28837] ? __fget+0x37f/0x550 [ 1622.173827][T28837] ? ksys_dup3+0x3e0/0x3e0 [ 1622.290277][T28837] ? __fget_light+0x1a9/0x230 [ 1622.294944][T28837] ? __fdget+0x1b/0x20 [ 1622.299023][T28837] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1622.305262][T28837] __sys_sendmsg+0x105/0x1d0 [ 1622.309859][T28837] ? __sys_sendmsg_sock+0xc0/0xc0 [ 1622.314898][T28837] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1622.320358][T28837] ? do_syscall_64+0x26/0x790 [ 1622.325026][T28837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1622.331078][T28837] ? do_syscall_64+0x26/0x790 [ 1622.335747][T28837] __x64_sys_sendmsg+0x78/0xb0 [ 1622.340501][T28837] do_syscall_64+0xfa/0x790 [ 1622.344995][T28837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1622.350887][T28837] RIP: 0033:0x45a849 [ 1622.354780][T28837] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1622.374372][T28837] RSP: 002b:00007f9c20587c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1622.382784][T28837] RAX: ffffffffffffffda RBX: 00007f9c20587c90 RCX: 000000000045a849 [ 1622.390740][T28837] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1622.398818][T28837] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1622.406775][T28837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c205886d4 [ 1622.414731][T28837] R13: 00000000004c9985 R14: 00000000004e1778 R15: 0000000000000006 22:36:21 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x60], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x500) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = memfd_create(&(0x7f0000000240)='\xea\x9e\xae\xf5\r\xf3\xeby?1\xe3G]\xb1\xb2\xde4\xb0=%\xf3\xb2Y\xfc\x1b\x8a\xa6\xaa\xd91\x05\x7f\xed\xe0\xaf\x8fk?\xd8k\xd1\x06\xad\xb6\x9d\xbe\x05\x9d\x14X\xbf6\xb7\\4\xab\xb0\xa0\xb0\x16*hp\x1bK\x85\x82\xdb-\x17H4\xf1\x90\xd7\xfe\xaa}\"a\xd9\x1f\xf5\xba\xa2\xd7\x15&\xed\x15Q\x83\x86\t\xa3tc\xbch\xc7t\xca2\xd3\x9e\x17\xf6\x14\xa7K\xae\x9f\xf1A\xc7\xdf\xc2\xe6%~\xbd\xcb\xce\xf8\xf9\xd8\x84h\xe6_\xc5\x99\xb3\xfe\xea\xe1\xb1\xf2\x8b\xb3\xa0\xfa\xc1\x00\xe1\x9e\xf0\xd5\x93\xc1K\x10\xcd5\xa4Wiz\x90\xe0\f\x86\xef:\xe6\xf6;\xadz\xbe1\xba\x9d\xf2\xdb\t\xc3\xd8\xf9\x9a\xa5\x16\xd9\x00\x11\xefn\xed\xb7\xafi\xc1,AK', 0x4) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2400, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f0000000080)=0x402048, 0x4) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0xf3, "f9bc1dc33f922888442e6d66b896eda2fac5148646109431944d037f0c00301ca1fdb7ab748295f46b7a8fe779ef58e209f7143cd2db18d72f96dde775663b4a0d74e6cc1e6c15a2900cde4629185a1e7bf314450b6657c6b2ff750b2cc5170c3f1d3ae4a27a50f012806e637b3048ded5e19cb0bdb7cfb025677a76b053565e50374178ec18fbe2266a95aa3bf1bbbc975083d6d96f9c32ae9f8cb0ed87f4e1da6b5154435649c7be127f8e7b8d6b074bf9cf17ae70da9312b0fb0e8e4d26da65d827528db00c3f7de4825d997a6cb103a2469e191af1e6862d741fd0df2c1ab6c8e12a697e13ccdfd6fae2b83205b3231cd1"}, &(0x7f00000001c0)=0x137) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000200)={r4, 0x27, "80e0580f19b537bc0b25dda8886898a27f467cdd412537e43cf30f413dee64c05f3632dd44197c"}, &(0x7f0000000340)=0x2f) r5 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r7 = dup2(r6, r5) ppoll(&(0x7f0000000600)=[{r7, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$EVIOCSCLOCKID(r7, 0x400445a0, &(0x7f0000000400)=0x2) r8 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r10 = dup2(r9, r8) ppoll(&(0x7f0000000600)=[{r10, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r10, 0x4040aea4, &(0x7f0000000440)={0x200, 0x5, 0x1, 0x6, 0x10000}) r11 = dup2(r2, r1) ppoll(&(0x7f00000000c0), 0x200000a4, 0x0, 0x0, 0xffffff46) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r11, 0x6, 0x14, &(0x7f0000000000)=0x3, 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x101, @dev}, {0xa, 0x0, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, 0x101, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}, 0x5c) 22:36:21 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:21 executing program 4 (fault-call:6 fault-nth:1): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) 22:36:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000ffff", 0x39}], 0x1) 22:36:21 executing program 3: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:21 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x2], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1622.966562][T28865] device bridge83 entered promiscuous mode [ 1623.012360][T28868] FAULT_INJECTION: forcing a failure. [ 1623.012360][T28868] name failslab, interval 1, probability 0, space 0, times 0 [ 1623.016152][T28872] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1623.090186][T28872] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1623.099538][T28868] CPU: 1 PID: 28868 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1623.099549][T28868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.099555][T28868] Call Trace: [ 1623.099579][T28868] dump_stack+0x197/0x210 [ 1623.099605][T28868] should_fail.cold+0xa/0x15 [ 1623.099626][T28868] ? fault_create_debugfs_attr+0x180/0x180 [ 1623.099648][T28868] ? ___might_sleep+0x163/0x2c0 [ 1623.099671][T28868] __should_failslab+0x121/0x190 [ 1623.099691][T28868] should_failslab+0x9/0x14 [ 1623.099705][T28868] kmem_cache_alloc_node_trace+0x274/0x750 [ 1623.099722][T28868] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1623.099736][T28868] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1623.099757][T28868] __kmalloc_node_track_caller+0x3d/0x70 [ 1623.173951][T28868] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1623.179335][T28868] __alloc_skb+0x10b/0x5e0 [ 1623.183765][T28868] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1623.189589][T28868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1623.195823][T28868] ? netlink_autobind.isra.0+0x223/0x300 [ 1623.201463][T28868] netlink_sendmsg+0xa1b/0xea0 [ 1623.206233][T28868] ? netlink_unicast+0x7d0/0x7d0 [ 1623.211179][T28868] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1623.216730][T28868] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1623.222201][T28868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1623.228430][T28868] ? security_socket_sendmsg+0x8d/0xc0 [ 1623.233891][T28868] ? netlink_unicast+0x7d0/0x7d0 [ 1623.238841][T28868] sock_sendmsg+0xd7/0x130 [ 1623.243275][T28868] ____sys_sendmsg+0x753/0x880 [ 1623.248038][T28868] ? kernel_sendmsg+0x50/0x50 [ 1623.252706][T28868] ? __fget+0x35d/0x550 [ 1623.256873][T28868] ? find_held_lock+0x35/0x130 [ 1623.261665][T28868] ___sys_sendmsg+0x100/0x170 [ 1623.266338][T28868] ? sendmsg_copy_msghdr+0x70/0x70 [ 1623.271460][T28868] ? __kasan_check_read+0x11/0x20 [ 1623.276500][T28868] ? __fget+0x37f/0x550 [ 1623.280657][T28868] ? ksys_dup3+0x3e0/0x3e0 [ 1623.285090][T28868] ? __fget_light+0x1a9/0x230 [ 1623.289761][T28868] ? __fdget+0x1b/0x20 [ 1623.293944][T28868] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1623.300225][T28868] __sys_sendmsg+0x105/0x1d0 [ 1623.304826][T28868] ? __sys_sendmsg_sock+0xc0/0xc0 [ 1623.309869][T28868] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1623.315332][T28868] ? do_syscall_64+0x26/0x790 [ 1623.319999][T28868] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1623.326069][T28868] ? do_syscall_64+0x26/0x790 [ 1623.330763][T28868] __x64_sys_sendmsg+0x78/0xb0 [ 1623.335537][T28868] do_syscall_64+0xfa/0x790 [ 1623.340032][T28868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1623.345925][T28868] RIP: 0033:0x45a849 [ 1623.349808][T28868] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1623.369397][T28868] RSP: 002b:00007f9c20587c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1623.377794][T28868] RAX: ffffffffffffffda RBX: 00007f9c20587c90 RCX: 000000000045a849 22:36:22 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x38) [ 1623.385751][T28868] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1623.393707][T28868] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1623.401661][T28868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c205886d4 [ 1623.409617][T28868] R13: 00000000004c9985 R14: 00000000004e1778 R15: 0000000000000006 22:36:22 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x3], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x8f) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:22 executing program 3 (fault-call:6 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 22:36:22 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x45], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:22 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x60], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1623.845710][T28905] FAULT_INJECTION: forcing a failure. [ 1623.845710][T28905] name failslab, interval 1, probability 0, space 0, times 0 [ 1623.874389][T28905] CPU: 1 PID: 28905 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1623.883094][T28905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.893163][T28905] Call Trace: [ 1623.893207][T28905] dump_stack+0x197/0x210 [ 1623.893235][T28905] should_fail.cold+0xa/0x15 [ 1623.893257][T28905] ? fault_create_debugfs_attr+0x180/0x180 [ 1623.893286][T28905] ? ___might_sleep+0x163/0x2c0 [ 1623.893309][T28905] __should_failslab+0x121/0x190 [ 1623.921179][T28905] should_failslab+0x9/0x14 [ 1623.925696][T28905] __kmalloc+0x2e0/0x770 [ 1623.929957][T28905] ? mark_held_locks+0xf0/0xf0 [ 1623.934736][T28905] ? mark_lock+0xc2/0x1220 [ 1623.939166][T28905] ? _parse_integer+0x190/0x190 [ 1623.944033][T28905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1623.950357][T28905] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1623.956099][T28905] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1623.961685][T28905] ? tomoyo_path_number_perm+0x193/0x520 [ 1623.967339][T28905] tomoyo_path_number_perm+0x1dd/0x520 [ 1623.972814][T28905] ? tomoyo_path_number_perm+0x193/0x520 [ 1623.978466][T28905] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1623.984286][T28905] ? perf_trace_lock_acquire+0xf5/0x530 [ 1623.989878][T28905] ? __fget+0x37f/0x550 [ 1623.994069][T28905] ? ksys_dup3+0x3e0/0x3e0 [ 1623.998492][T28905] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1624.004744][T28905] ? fput_many+0x12c/0x1a0 [ 1624.009211][T28905] tomoyo_file_ioctl+0x23/0x30 [ 1624.014034][T28905] security_file_ioctl+0x77/0xc0 [ 1624.018986][T28905] ksys_ioctl+0x57/0xd0 [ 1624.023154][T28905] __x64_sys_ioctl+0x73/0xb0 [ 1624.027747][T28905] do_syscall_64+0xfa/0x790 [ 1624.027771][T28905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1624.027781][T28905] RIP: 0033:0x45a849 [ 1624.027799][T28905] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1624.061714][T28905] RSP: 002b:00007f3b0e013c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1624.070154][T28905] RAX: ffffffffffffffda RBX: 00007f3b0e013c90 RCX: 000000000045a849 [ 1624.078160][T28905] RDX: 0000000000000003 RSI: 000000000000540a RDI: 0000000000000003 [ 1624.086163][T28905] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1624.094157][T28905] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b0e0146d4 [ 1624.102134][T28905] R13: 00000000004c5a00 R14: 00000000004dbc28 R15: 0000000000000005 22:36:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x40000, @local}, {0xa, 0x0, 0xfffffffc, @mcast1}}, 0x5c) 22:36:23 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1624.192648][T28905] ERROR: Out of memory at tomoyo_realpath_from_path. 22:36:23 executing program 4 (fault-call:6 fault-nth:2): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) 22:36:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000ffff", 0x39}], 0x1) [ 1624.287834][T28919] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:23 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1624.333584][T28919] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000ffff", 0x39}], 0x1) [ 1624.433245][T28925] FAULT_INJECTION: forcing a failure. [ 1624.433245][T28925] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.446122][ C0] net_ratelimit: 14 callbacks suppressed [ 1624.446155][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1624.446223][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:36:23 executing program 3 (fault-call:6 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0004060000feff800000003a4288443e7ff09b5ed7750700feff162d0201008cfe6d40fedc00000075c4171f001b4f36366194335b71e5fe003b40040000710e134c2a7b9db52376591a7a71e8b8e01db2e9b638096e6c582a66a2279a6f3d82dd1f2c27283c2b9fdb90109e6697fa878514e8277f16bedd18081374ea271190fdda477c053c82cf881194fae73ec1a838a8edeb69fa40103c110d5535bd2d886c53250d51a6279441c1adcda2b01a51c324b9d87b206bba083a1a0fb8cbfdfb48b6a6c5f16162f77ad1478ac098f8a217924e062dbd81c4460ec487f4b0723dd071d60a69e32a19ba723141e536d880b600e7a976b5a8d2c17c1e0764e201a554080057191ea805dc590775526f9e911393494a1d33f1e6ce190f389d990b6f1cecf6e3801af8fe78b45cf33a64bb47b8b9bae67ce7fdf5ddf8f1bdb9f84999953ae90867185c38d5446925c20300000000000000392a032328fcaf1fa4046db3e358503e4a1861f7b5132204614e51a91990cbed370be7a51a1603f6259b275080f4ddf59da885ca3e9b461132125ee8d880bbb1084a4307caee6a509af879ec047276b4709dbf104584c794f6f60543b0285e8a8b419b73e885c1c8907199f7a98e78bd040000000000000056dbf7a3c023a47ddcb9b4b978331f7020cd901bffd7b972d06a9c28979b001524949d69bd2bc792fd32f8f7a300000000000000000000000000000000ccf6a66f86d7e51f54bf105c16d62880408ac4e6806ff9e857f1a8cdfaa4f5a1fd4bbf7f3aeb28c2834b4f5845c44513d593598b9785da82c52d9a93853aa56bca5a8200fa44e1fe2f449e223821357165ea298737a35e116448a3d12fe7af14e2ce456fe53fb40012a96c56fc0a46809bfa5f9b3dcf194c2ed024"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 1624.517784][T28933] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1624.520413][T28922] device bridge84 entered promiscuous mode [ 1624.532116][T28933] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1624.566423][T28925] CPU: 0 PID: 28925 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1624.575148][T28925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1624.585216][T28925] Call Trace: [ 1624.588527][T28925] dump_stack+0x197/0x210 [ 1624.592893][T28925] should_fail.cold+0xa/0x15 [ 1624.597506][T28925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1624.603806][T28925] ? fault_create_debugfs_attr+0x180/0x180 [ 1624.609644][T28925] __should_failslab+0x121/0x190 [ 1624.614603][T28925] should_failslab+0x9/0x14 [ 1624.619159][T28925] kmem_cache_alloc+0x47/0x710 [ 1624.623937][T28925] ? lock_acquire+0x190/0x410 [ 1624.628621][T28925] ? netlink_deliver_tap+0x146/0xbe0 [ 1624.633928][T28925] skb_clone+0x154/0x3d0 [ 1624.638191][T28925] netlink_deliver_tap+0x943/0xbe0 [ 1624.643330][T28925] netlink_unicast+0x643/0x7d0 [ 1624.648117][T28925] ? netlink_attachskb+0x870/0x870 [ 1624.653241][T28925] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1624.658987][T28925] ? __check_object_size+0x3d/0x437 [ 1624.664200][T28925] netlink_sendmsg+0x91c/0xea0 [ 1624.668985][T28925] ? netlink_unicast+0x7d0/0x7d0 [ 1624.673938][T28925] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1624.679502][T28925] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1624.684998][T28925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1624.691331][T28925] ? security_socket_sendmsg+0x8d/0xc0 [ 1624.691349][T28925] ? netlink_unicast+0x7d0/0x7d0 [ 1624.691367][T28925] sock_sendmsg+0xd7/0x130 [ 1624.691385][T28925] ____sys_sendmsg+0x753/0x880 [ 1624.691405][T28925] ? kernel_sendmsg+0x50/0x50 [ 1624.691419][T28925] ? __fget+0x35d/0x550 [ 1624.691433][T28925] ? find_held_lock+0x35/0x130 [ 1624.691459][T28925] ___sys_sendmsg+0x100/0x170 [ 1624.691479][T28925] ? sendmsg_copy_msghdr+0x70/0x70 [ 1624.691499][T28925] ? __kasan_check_read+0x11/0x20 [ 1624.701893][T28925] ? __fget+0x37f/0x550 [ 1624.701917][T28925] ? ksys_dup3+0x3e0/0x3e0 [ 1624.701943][T28925] ? __fget_light+0x1a9/0x230 [ 1624.701960][T28925] ? __fdget+0x1b/0x20 [ 1624.756748][T28925] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1624.762998][T28925] __sys_sendmsg+0x105/0x1d0 [ 1624.763015][T28925] ? __sys_sendmsg_sock+0xc0/0xc0 [ 1624.763047][T28925] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1624.763061][T28925] ? do_syscall_64+0x26/0x790 [ 1624.763077][T28925] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1624.763096][T28925] ? do_syscall_64+0x26/0x790 [ 1624.793565][T28925] __x64_sys_sendmsg+0x78/0xb0 [ 1624.798352][T28925] do_syscall_64+0xfa/0x790 [ 1624.802878][T28925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1624.808774][T28925] RIP: 0033:0x45a849 [ 1624.812678][T28925] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1624.832293][T28925] RSP: 002b:00007f9c20587c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1624.840726][T28925] RAX: ffffffffffffffda RBX: 00007f9c20587c90 RCX: 000000000045a849 [ 1624.848720][T28925] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1624.856713][T28925] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 22:36:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x502) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:23 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x3], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1624.864704][T28925] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c205886d4 [ 1624.872688][T28925] R13: 00000000004c9985 R14: 00000000004e1778 R15: 0000000000000006 22:36:23 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x12, 0x8, 0x0, 0x4, 0x0, 0x70bd2b, 0x25dfdbff, [@sadb_x_sa2={0x2, 0x13, 0x4e, 0x0, 0x0, 0x70bd2c}]}, 0x20}}, 0x800) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = memfd_create(&(0x7f00000000c0)='#\\md5sumsystemcgroupmd5sumsystem\x00', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:23 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x45], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1624.918824][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1624.924724][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1624.930623][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1624.936440][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1624.980428][T28950] FAULT_INJECTION: forcing a failure. [ 1624.980428][T28950] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.036635][T28950] CPU: 0 PID: 28950 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1625.045465][T28950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1625.055540][T28950] Call Trace: [ 1625.058877][T28950] dump_stack+0x197/0x210 [ 1625.063236][T28950] should_fail.cold+0xa/0x15 [ 1625.067851][T28950] ? fault_create_debugfs_attr+0x180/0x180 [ 1625.073684][T28950] ? ___might_sleep+0x163/0x2c0 [ 1625.081686][T28950] __should_failslab+0x121/0x190 [ 1625.086673][T28950] should_failslab+0x9/0x14 [ 1625.091196][T28950] __kmalloc+0x2e0/0x770 [ 1625.095590][T28950] ? tomoyo_unix_entry.cold+0x1f/0x1f [ 1625.100982][T28950] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1625.106808][T28950] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1625.112228][T28950] tomoyo_encode2.part.0+0xf5/0x400 [ 1625.117463][T28950] tomoyo_encode+0x2b/0x50 [ 1625.121890][T28950] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1625.127555][T28950] ? tomoyo_path_number_perm+0x193/0x520 [ 1625.133209][T28950] tomoyo_path_number_perm+0x1dd/0x520 [ 1625.138681][T28950] ? tomoyo_path_number_perm+0x193/0x520 [ 1625.144328][T28950] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1625.150149][T28950] ? perf_trace_lock_acquire+0xf5/0x530 [ 1625.155744][T28950] ? __fget+0x37f/0x550 [ 1625.159922][T28950] ? ksys_dup3+0x3e0/0x3e0 [ 1625.164350][T28950] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1625.170596][T28950] ? fput_many+0x12c/0x1a0 [ 1625.170620][T28950] tomoyo_file_ioctl+0x23/0x30 [ 1625.170637][T28950] security_file_ioctl+0x77/0xc0 22:36:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e000100060003480000000000000000f0", 0x39}], 0x1) 22:36:24 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x60], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1625.170660][T28950] ksys_ioctl+0x57/0xd0 [ 1625.189177][T28950] __x64_sys_ioctl+0x73/0xb0 [ 1625.189199][T28950] do_syscall_64+0xfa/0x790 [ 1625.189221][T28950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1625.189234][T28950] RIP: 0033:0x45a849 [ 1625.189249][T28950] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1625.189262][T28950] RSP: 002b:00007f3b0e013c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:36:24 executing program 4 (fault-call:6 fault-nth:3): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) [ 1625.236166][T28950] RAX: ffffffffffffffda RBX: 00007f3b0e013c90 RCX: 000000000045a849 [ 1625.236176][T28950] RDX: 0000000000000003 RSI: 000000000000540a RDI: 0000000000000003 [ 1625.236186][T28950] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1625.236196][T28950] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b0e0146d4 [ 1625.236205][T28950] R13: 00000000004c5a00 R14: 00000000004dbc28 R15: 0000000000000005 [ 1625.297419][T28961] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1625.324299][T28962] device bridge85 entered promiscuous mode [ 1625.334733][T28961] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1625.362694][T28965] FAULT_INJECTION: forcing a failure. [ 1625.362694][T28965] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.375752][T28965] CPU: 0 PID: 28965 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1625.384445][T28965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1625.394693][T28965] Call Trace: [ 1625.398040][T28965] dump_stack+0x197/0x210 [ 1625.402407][T28965] should_fail.cold+0xa/0x15 [ 1625.407010][T28965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1625.413395][T28965] ? fault_create_debugfs_attr+0x180/0x180 [ 1625.419228][T28965] __should_failslab+0x121/0x190 [ 1625.424181][T28965] should_failslab+0x9/0x14 [ 1625.428698][T28965] kmem_cache_alloc+0x47/0x710 [ 1625.429015][T28950] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1625.433482][T28965] ? lock_acquire+0x190/0x410 [ 1625.433536][T28965] ? dev_fill_metadata_dst+0x6f0/0x6f0 [ 1625.433558][T28965] skb_clone+0x154/0x3d0 [ 1625.433580][T28965] dev_queue_xmit_nit+0x3a1/0xa20 [ 1625.454660][T28965] ? validate_xmit_xfrm+0x43c/0xf10 [ 1625.454694][T28965] dev_hard_start_xmit+0xbb/0x9b0 [ 1625.454714][T28965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1625.454735][T28965] __dev_queue_xmit+0x2b05/0x35c0 [ 1625.481224][T28965] ? __kasan_check_read+0x11/0x20 [ 1625.481255][T28965] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 1625.481274][T28965] ? __copy_skb_header+0x260/0x5e0 [ 1625.481289][T28965] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1625.481307][T28965] ? skb_splice_bits+0x1a0/0x1a0 [ 1625.481334][T28965] ? __kasan_check_write+0x14/0x20 [ 1625.491660][T28965] ? __skb_clone+0x5c8/0x820 [ 1625.491691][T28965] dev_queue_xmit+0x18/0x20 [ 1625.491706][T28965] ? dev_queue_xmit+0x18/0x20 [ 1625.491725][T28965] netlink_deliver_tap+0x8d8/0xbe0 [ 1625.491754][T28965] netlink_unicast+0x643/0x7d0 [ 1625.491774][T28965] ? netlink_attachskb+0x870/0x870 [ 1625.491795][T28965] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1625.546950][T28965] ? __check_object_size+0x3d/0x437 [ 1625.552174][T28965] netlink_sendmsg+0x91c/0xea0 [ 1625.556968][T28965] ? netlink_unicast+0x7d0/0x7d0 [ 1625.558909][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1625.561931][T28965] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1625.561954][T28965] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1625.561972][T28965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1625.561988][T28965] ? security_socket_sendmsg+0x8d/0xc0 [ 1625.562007][T28965] ? netlink_unicast+0x7d0/0x7d0 [ 1625.562027][T28965] sock_sendmsg+0xd7/0x130 [ 1625.562046][T28965] ____sys_sendmsg+0x753/0x880 [ 1625.562066][T28965] ? kernel_sendmsg+0x50/0x50 [ 1625.567861][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1625.573308][T28965] ? __fget+0x35d/0x550 [ 1625.573324][T28965] ? find_held_lock+0x35/0x130 [ 1625.573352][T28965] ___sys_sendmsg+0x100/0x170 [ 1625.573374][T28965] ? sendmsg_copy_msghdr+0x70/0x70 [ 1625.578970][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1625.585035][T28965] ? __kasan_check_read+0x11/0x20 [ 1625.585061][T28965] ? __fget+0x37f/0x550 [ 1625.590698][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1625.595531][T28965] ? ksys_dup3+0x3e0/0x3e0 [ 1625.595557][T28965] ? __fget_light+0x1a9/0x230 [ 1625.664298][T28965] ? __fdget+0x1b/0x20 [ 1625.668375][T28965] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1625.674631][T28965] __sys_sendmsg+0x105/0x1d0 [ 1625.679254][T28965] ? __sys_sendmsg_sock+0xc0/0xc0 [ 1625.684302][T28965] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1625.689787][T28965] ? do_syscall_64+0x26/0x790 [ 1625.694473][T28965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1625.700559][T28965] ? do_syscall_64+0x26/0x790 [ 1625.705258][T28965] __x64_sys_sendmsg+0x78/0xb0 [ 1625.710032][T28965] do_syscall_64+0xfa/0x790 [ 1625.714538][T28965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1625.720448][T28965] RIP: 0033:0x45a849 [ 1625.724366][T28965] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1625.743995][T28965] RSP: 002b:00007f9c20587c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1625.752432][T28965] RAX: ffffffffffffffda RBX: 00007f9c20587c90 RCX: 000000000045a849 22:36:24 executing program 3 (fault-call:6 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 1625.760410][T28965] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1625.768385][T28965] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1625.776386][T28965] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c205886d4 [ 1625.784372][T28965] R13: 00000000004c9985 R14: 00000000004e1778 R15: 0000000000000006 22:36:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x503) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1625.975259][T28980] FAULT_INJECTION: forcing a failure. [ 1625.975259][T28980] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.019645][T28980] CPU: 1 PID: 28980 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1626.028393][T28980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1626.038455][T28980] Call Trace: [ 1626.041763][T28980] dump_stack+0x197/0x210 [ 1626.046112][T28980] should_fail.cold+0xa/0x15 [ 1626.050719][T28980] ? fault_create_debugfs_attr+0x180/0x180 [ 1626.056552][T28980] ? ___might_sleep+0x163/0x2c0 [ 1626.061419][T28980] __should_failslab+0x121/0x190 [ 1626.066372][T28980] should_failslab+0x9/0x14 [ 1626.070885][T28980] __kmalloc+0x2e0/0x770 [ 1626.075146][T28980] ? tomoyo_unix_entry.cold+0x1f/0x1f [ 1626.080537][T28980] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1626.086396][T28980] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1626.091808][T28980] tomoyo_encode2.part.0+0xf5/0x400 [ 1626.097054][T28980] tomoyo_encode+0x2b/0x50 [ 1626.101502][T28980] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1626.107166][T28980] ? tomoyo_path_number_perm+0x193/0x520 [ 1626.112818][T28980] tomoyo_path_number_perm+0x1dd/0x520 [ 1626.118286][T28980] ? tomoyo_path_number_perm+0x193/0x520 [ 1626.123931][T28980] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1626.129749][T28980] ? perf_trace_lock_acquire+0xf5/0x530 [ 1626.135343][T28980] ? __fget+0x37f/0x550 [ 1626.139532][T28980] ? ksys_dup3+0x3e0/0x3e0 [ 1626.143955][T28980] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1626.150203][T28980] ? fput_many+0x12c/0x1a0 [ 1626.154630][T28980] tomoyo_file_ioctl+0x23/0x30 [ 1626.159408][T28980] security_file_ioctl+0x77/0xc0 [ 1626.164353][T28980] ksys_ioctl+0x57/0xd0 [ 1626.168516][T28980] __x64_sys_ioctl+0x73/0xb0 [ 1626.173111][T28980] do_syscall_64+0xfa/0x790 [ 1626.177759][T28980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1626.183674][T28980] RIP: 0033:0x45a849 [ 1626.187581][T28980] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1626.207198][T28980] RSP: 002b:00007f3b0e013c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:36:25 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1626.215622][T28980] RAX: ffffffffffffffda RBX: 00007f3b0e013c90 RCX: 000000000045a849 [ 1626.223598][T28980] RDX: 0000000000000003 RSI: 000000000000540a RDI: 0000000000000003 [ 1626.231571][T28980] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1626.239553][T28980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b0e0146d4 [ 1626.247562][T28980] R13: 00000000004c5a00 R14: 00000000004dbc28 R15: 0000000000000005 22:36:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000009eff", 0x39}], 0x1) 22:36:25 executing program 4 (fault-call:6 fault-nth:4): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) [ 1626.328948][T28980] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1626.430707][T28992] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 22:36:25 executing program 3 (fault-call:6 fault-nth:3): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 1626.471865][T28992] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1626.493528][T28993] device bridge86 entered promiscuous mode [ 1626.538122][T28996] FAULT_INJECTION: forcing a failure. [ 1626.538122][T28996] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.586987][T28996] CPU: 1 PID: 28996 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1626.595807][T28996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1626.598555][T29000] FAULT_INJECTION: forcing a failure. [ 1626.598555][T29000] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.605869][T28996] Call Trace: [ 1626.605890][T28996] dump_stack+0x197/0x210 [ 1626.605909][T28996] should_fail.cold+0xa/0x15 [ 1626.605925][T28996] ? fault_create_debugfs_attr+0x180/0x180 [ 1626.605940][T28996] ? ___might_sleep+0x163/0x2c0 [ 1626.605955][T28996] __should_failslab+0x121/0x190 [ 1626.605969][T28996] should_failslab+0x9/0x14 [ 1626.605980][T28996] kmem_cache_alloc_trace+0x2d3/0x790 [ 1626.606012][T28996] rtnl_newlink+0x4b/0xa0 [ 1626.606027][T28996] ? __rtnl_newlink+0x1790/0x1790 [ 1626.606041][T28996] rtnetlink_rcv_msg+0x45e/0xaf0 [ 1626.606058][T28996] ? rtnl_bridge_getlink+0x910/0x910 [ 1626.606075][T28996] ? netlink_deliver_tap+0x228/0xbe0 [ 1626.606087][T28996] ? find_held_lock+0x35/0x130 [ 1626.606106][T28996] netlink_rcv_skb+0x177/0x450 [ 1626.606120][T28996] ? rtnl_bridge_getlink+0x910/0x910 [ 1626.606135][T28996] ? netlink_ack+0xb50/0xb50 [ 1626.606146][T28996] ? __kasan_check_read+0x11/0x20 [ 1626.606161][T28996] ? netlink_deliver_tap+0x24a/0xbe0 [ 1626.606177][T28996] rtnetlink_rcv+0x1d/0x30 [ 1626.606189][T28996] netlink_unicast+0x58c/0x7d0 [ 1626.606205][T28996] ? netlink_attachskb+0x870/0x870 [ 1626.606218][T28996] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1626.606231][T28996] ? __check_object_size+0x3d/0x437 [ 1626.606247][T28996] netlink_sendmsg+0x91c/0xea0 [ 1626.606263][T28996] ? netlink_unicast+0x7d0/0x7d0 [ 1626.606276][T28996] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1626.606290][T28996] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1626.606303][T28996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1626.606314][T28996] ? security_socket_sendmsg+0x8d/0xc0 [ 1626.606326][T28996] ? netlink_unicast+0x7d0/0x7d0 [ 1626.606339][T28996] sock_sendmsg+0xd7/0x130 [ 1626.606351][T28996] ____sys_sendmsg+0x753/0x880 22:36:25 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000000)) [ 1626.606366][T28996] ? kernel_sendmsg+0x50/0x50 [ 1626.606376][T28996] ? __fget+0x35d/0x550 [ 1626.606386][T28996] ? find_held_lock+0x35/0x130 [ 1626.606404][T28996] ___sys_sendmsg+0x100/0x170 [ 1626.606419][T28996] ? sendmsg_copy_msghdr+0x70/0x70 [ 1626.606429][T28996] ? __kasan_check_read+0x11/0x20 [ 1626.606442][T28996] ? __fget+0x37f/0x550 [ 1626.606456][T28996] ? ksys_dup3+0x3e0/0x3e0 [ 1626.606472][T28996] ? __fget_light+0x1a9/0x230 [ 1626.606483][T28996] ? __fdget+0x1b/0x20 [ 1626.606495][T28996] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1626.606510][T28996] __sys_sendmsg+0x105/0x1d0 [ 1626.606523][T28996] ? __sys_sendmsg_sock+0xc0/0xc0 [ 1626.606543][T28996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1626.606555][T28996] ? do_syscall_64+0x26/0x790 [ 1626.606567][T28996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1626.606578][T28996] ? do_syscall_64+0x26/0x790 [ 1626.606594][T28996] __x64_sys_sendmsg+0x78/0xb0 [ 1626.606607][T28996] do_syscall_64+0xfa/0x790 [ 1626.606620][T28996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1626.606629][T28996] RIP: 0033:0x45a849 [ 1626.606642][T28996] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1626.606648][T28996] RSP: 002b:00007f9c20587c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1626.606659][T28996] RAX: ffffffffffffffda RBX: 00007f9c20587c90 RCX: 000000000045a849 [ 1626.606665][T28996] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1626.606677][T28996] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1626.606684][T28996] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c205886d4 [ 1626.606691][T28996] R13: 00000000004c9985 R14: 00000000004e1778 R15: 0000000000000006 [ 1626.826141][ T4089] kobject: 'loop0' (000000009bfb8ede): kobject_uevent_env [ 1626.829363][T29000] CPU: 0 PID: 29000 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1626.829371][T29000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1626.829376][T29000] Call Trace: [ 1626.829397][T29000] dump_stack+0x197/0x210 [ 1626.829421][T29000] should_fail.cold+0xa/0x15 [ 1626.841731][ T4089] kobject: 'loop0' (000000009bfb8ede): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1626.845252][T29000] ? fault_create_debugfs_attr+0x180/0x180 [ 1626.845272][T29000] ? __kasan_check_read+0x11/0x20 [ 1627.012245][T29000] __should_failslab+0x121/0x190 [ 1627.017220][T29000] should_failslab+0x9/0x14 [ 1627.021741][T29000] __kmalloc+0x71/0x770 [ 1627.025903][T29000] ? mark_held_locks+0xf0/0xf0 [ 1627.030672][T29000] ? __tty_buffer_request_room+0x1fb/0x5c0 22:36:26 executing program 0: socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1627.036485][T29000] __tty_buffer_request_room+0x1fb/0x5c0 [ 1627.042147][T29000] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 1627.048409][T29000] pty_write+0x133/0x200 [ 1627.052664][T29000] tty_send_xchar+0x2fb/0x380 [ 1627.057343][T29000] ? tty_write_message+0x120/0x120 [ 1627.062462][T29000] ? __tty_check_change+0x81/0x490 [ 1627.067587][T29000] n_tty_ioctl_helper+0x192/0x3b0 [ 1627.072622][T29000] n_tty_ioctl+0x59/0x370 [ 1627.076959][T29000] ? ldsem_down_read+0x33/0x40 [ 1627.077078][ T4089] kobject: 'loop0' (000000009bfb8ede): kobject_uevent_env [ 1627.081722][T29000] tty_ioctl+0xaf9/0x14f0 [ 1627.081736][T29000] ? n_tty_receive_signal_char+0x120/0x120 [ 1627.081748][T29000] ? tty_vhangup+0x30/0x30 [ 1627.081763][T29000] ? tomoyo_path_number_perm+0x454/0x520 [ 1627.081781][T29000] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1627.081793][T29000] ? tomoyo_path_number_perm+0x25e/0x520 [ 1627.081811][T29000] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1627.098037][ T4089] kobject: 'loop0' (000000009bfb8ede): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1627.099179][T29000] ? tty_vhangup+0x30/0x30 [ 1627.099197][T29000] do_vfs_ioctl+0x977/0x14e0 [ 1627.099214][T29000] ? compat_ioctl_preallocate+0x220/0x220 [ 1627.099227][T29000] ? __fget+0x37f/0x550 [ 1627.099243][T29000] ? ksys_dup3+0x3e0/0x3e0 [ 1627.099261][T29000] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1627.166620][T29000] ? fput_many+0x12c/0x1a0 [ 1627.171058][T29000] ? tomoyo_file_ioctl+0x23/0x30 [ 1627.176001][T29000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1627.182281][T29000] ? security_file_ioctl+0x8d/0xc0 22:36:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x504) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1627.187417][T29000] ksys_ioctl+0xab/0xd0 [ 1627.191585][T29000] __x64_sys_ioctl+0x73/0xb0 [ 1627.196185][T29000] do_syscall_64+0xfa/0x790 [ 1627.196940][ T4089] kobject: 'loop5' (000000006e3983ee): kobject_uevent_env [ 1627.200687][T29000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.200697][T29000] RIP: 0033:0x45a849 [ 1627.200711][T29000] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1627.200717][T29000] RSP: 002b:00007f3b0e013c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1627.200730][T29000] RAX: ffffffffffffffda RBX: 00007f3b0e013c90 RCX: 000000000045a849 [ 1627.200743][T29000] RDX: 0000000000000003 RSI: 000000000000540a RDI: 0000000000000003 [ 1627.225459][ T4089] kobject: 'loop5' (000000006e3983ee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1627.237324][T29000] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1627.237331][T29000] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b0e0146d4 [ 1627.237338][T29000] R13: 00000000004c5a00 R14: 00000000004dbc28 R15: 0000000000000005 [ 1627.237366][ C0] [ 1627.237372][ C0] ====================================================== [ 1627.237377][ C0] WARNING: possible circular locking dependency detected [ 1627.237380][ C0] 5.5.0-rc1-syzkaller #0 Not tainted [ 1627.237393][ C0] ------------------------------------------------------ [ 1627.237397][ C0] syz-executor.3/29000 is trying to acquire lock: [ 1627.237399][ C0] ffffffff8999aa80 (console_owner){-.-.}, at: vprintk_emit+0x3fd/0x700 [ 1627.237411][ C0] [ 1627.237415][ C0] but task is already holding lock: [ 1627.237417][ C0] ffff888027fbf140 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 1627.237430][ C0] [ 1627.237435][ C0] which lock already depends on the new lock. [ 1627.237437][ C0] [ 1627.237439][ C0] [ 1627.237444][ C0] the existing dependency chain (in reverse order) is: [ 1627.237446][ C0] [ 1627.237448][ C0] -> #2 (&(&port->lock)->rlock){-.-.}: [ 1627.237462][ C0] _raw_spin_lock_irqsave+0x95/0xcd [ 1627.237466][ C0] tty_port_tty_get+0x24/0x100 [ 1627.237471][ C0] tty_port_default_wakeup+0x16/0x40 [ 1627.237475][ C0] tty_port_tty_wakeup+0x57/0x70 [ 1627.237478][ C0] uart_write_wakeup+0x46/0x70 [ 1627.237482][ C0] serial8250_tx_chars+0x495/0xaf0 [ 1627.237486][ C0] serial8250_handle_irq.part.0+0x2a2/0x330 [ 1627.237491][ C0] serial8250_default_handle_irq+0xc0/0x150 [ 1627.237494][ C0] serial8250_interrupt+0xf1/0x1a0 22:36:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000f0ff", 0x39}], 0x1) 22:36:26 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1627.237498][ C0] __handle_irq_event_percpu+0x15d/0x970 [ 1627.237503][ C0] handle_irq_event_percpu+0x74/0x160 [ 1627.237506][ C0] handle_irq_event+0xa7/0x134 [ 1627.237510][ C0] handle_edge_irq+0x25e/0x8d0 [ 1627.237513][ C0] do_IRQ+0xde/0x280 [ 1627.237517][ C0] ret_from_intr+0x0/0x36 [ 1627.237520][ C0] native_safe_halt+0xe/0x10 [ 1627.237523][ C0] arch_cpu_idle+0xa/0x10 [ 1627.237527][ C0] default_idle_call+0x84/0xb0 [ 1627.237530][ C0] do_idle+0x3c8/0x6e0 [ 1627.237534][ C0] cpu_startup_entry+0x1b/0x20 [ 1627.237538][ C0] start_secondary+0x2f4/0x410 [ 1627.237542][ C0] secondary_startup_64+0xa4/0xb0 [ 1627.237544][ C0] [ 1627.237546][ C0] -> #1 (&port_lock_key){-.-.}: [ 1627.237559][ C0] _raw_spin_lock_irqsave+0x95/0xcd [ 1627.237563][ C0] serial8250_console_write+0x253/0x9a0 [ 1627.237567][ C0] univ8250_console_write+0x5f/0x70 [ 1627.237571][ C0] console_unlock+0xb7a/0xf00 [ 1627.237575][ C0] vprintk_emit+0x2a0/0x700 [ 1627.237578][ C0] vprintk_default+0x28/0x30 [ 1627.237582][ C0] vprintk_func+0x7e/0x189 [ 1627.237585][ C0] printk+0xba/0xed [ 1627.237589][ C0] register_console+0x745/0xb50 [ 1627.237593][ C0] univ8250_console_init+0x3e/0x4b [ 1627.237596][ C0] console_init+0x461/0x67b [ 1627.237600][ C0] start_kernel+0x653/0x943 [ 1627.237604][ C0] x86_64_start_reservations+0x29/0x2b [ 1627.237609][ C0] x86_64_start_kernel+0x77/0x7b 22:36:26 executing program 4 (fault-call:6 fault-nth:5): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) [ 1627.237612][ C0] secondary_startup_64+0xa4/0xb0 [ 1627.237615][ C0] [ 1627.237617][ C0] -> #0 (console_owner){-.-.}: [ 1627.237630][ C0] __lock_acquire+0x2596/0x4a00 [ 1627.237634][ C0] lock_acquire+0x190/0x410 [ 1627.237637][ C0] vprintk_emit+0x43a/0x700 [ 1627.237641][ C0] vprintk_default+0x28/0x30 [ 1627.237645][ C0] vprintk_func+0x7e/0x189 [ 1627.237648][ C0] printk+0xba/0xed [ 1627.237652][ C0] should_fail+0x708/0x852 [ 1627.237655][ C0] __should_failslab+0x121/0x190 [ 1627.237659][ C0] should_failslab+0x9/0x14 [ 1627.237662][ C0] __kmalloc+0x71/0x770 [ 1627.237667][ C0] __tty_buffer_request_room+0x1fb/0x5c0 [ 1627.237672][ C0] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 1627.237675][ C0] pty_write+0x133/0x200 [ 1627.237679][ C0] tty_send_xchar+0x2fb/0x380 [ 1627.237683][ C0] n_tty_ioctl_helper+0x192/0x3b0 [ 1627.237686][ C0] n_tty_ioctl+0x59/0x370 [ 1627.237690][ C0] tty_ioctl+0xaf9/0x14f0 [ 1627.237693][ C0] do_vfs_ioctl+0x977/0x14e0 [ 1627.237697][ C0] ksys_ioctl+0xab/0xd0 [ 1627.237700][ C0] __x64_sys_ioctl+0x73/0xb0 [ 1627.237704][ C0] do_syscall_64+0xfa/0x790 [ 1627.237708][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.237710][ C0] [ 1627.237714][ C0] other info that might help us debug this: [ 1627.237716][ C0] [ 1627.237719][ C0] Chain exists of: [ 1627.237721][ C0] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 1627.237739][ C0] 22:36:26 executing program 3 (fault-call:6 fault-nth:4): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 1627.237743][ C0] Possible unsafe locking scenario: [ 1627.237745][ C0] [ 1627.237749][ C0] CPU0 CPU1 [ 1627.237752][ C0] ---- ---- [ 1627.237755][ C0] lock(&(&port->lock)->rlock); [ 1627.237764][ C0] lock(&port_lock_key); [ 1627.237772][ C0] lock(&(&port->lock)->rlock); [ 1627.237780][ C0] lock(console_owner); [ 1627.237787][ C0] [ 1627.237790][ C0] *** DEADLOCK *** [ 1627.237792][ C0] [ 1627.237796][ C0] 4 locks held by syz-executor.3/29000: [ 1627.237798][ C0] #0: ffff88802b98b090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1627.237814][ C0] #1: ffff88802b98b118 (&tty->atomic_write_lock){+.+.}, at: tty_write_lock+0x23/0x90 [ 1627.237830][ C0] #2: ffff88802b98b2a0 (&o_tty->termios_rwsem/1){++++}, at: tty_send_xchar+0x21f/0x380 [ 1627.237848][ C0] #3: ffff888027fbf140 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 1627.237864][ C0] [ 1627.237867][ C0] stack backtrace: [ 1627.237873][ C0] CPU: 0 PID: 29000 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1627.237879][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1627.237882][ C0] Call Trace: [ 1627.237885][ C0] dump_stack+0x197/0x210 [ 1627.237889][ C0] print_circular_bug.isra.0.cold+0x163/0x172 [ 1627.237893][ C0] check_noncircular+0x32e/0x3e0 [ 1627.237897][ C0] ? print_circular_bug.isra.0+0x230/0x230 [ 1627.237901][ C0] ? alloc_list_entry+0xc0/0xc0 [ 1627.237905][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1627.237909][ C0] ? find_first_zero_bit+0x9a/0xc0 [ 1627.237912][ C0] __lock_acquire+0x2596/0x4a00 [ 1627.237916][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1627.237920][ C0] ? mark_held_locks+0xf0/0xf0 [ 1627.237923][ C0] lock_acquire+0x190/0x410 [ 1627.237927][ C0] ? vprintk_emit+0x3fd/0x700 [ 1627.237930][ C0] vprintk_emit+0x43a/0x700 [ 1627.237933][ C0] ? vprintk_emit+0x3fd/0x700 [ 1627.237937][ C0] vprintk_default+0x28/0x30 22:36:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 1627.237940][ C0] vprintk_func+0x7e/0x189 [ 1627.237944][ C0] ? is_bpf_text_address+0xac/0x160 [ 1627.237947][ C0] printk+0xba/0xed [ 1627.237951][ C0] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1627.237954][ C0] ? __kasan_check_read+0x11/0x20 [ 1627.237958][ C0] ? __lockdep_free_key_range+0x120/0x120 [ 1627.237962][ C0] ? perf_trace_lock_acquire+0xf5/0x530 [ 1627.237966][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1627.237970][ C0] ? ___ratelimit+0x60/0x595 [ 1627.237973][ C0] should_fail+0x708/0x852 [ 1627.237977][ C0] ? fault_create_debugfs_attr+0x180/0x180 [ 1627.237980][ C0] ? __kasan_check_read+0x11/0x20 [ 1627.237990][ C0] __should_failslab+0x121/0x190 [ 1627.237993][ C0] should_failslab+0x9/0x14 [ 1627.237997][ C0] __kmalloc+0x71/0x770 [ 1627.238000][ C0] ? mark_held_locks+0xf0/0xf0 [ 1627.238004][ C0] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 1627.238008][ C0] __tty_buffer_request_room+0x1fb/0x5c0 [ 1627.238012][ C0] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 1627.238015][ C0] pty_write+0x133/0x200 [ 1627.238019][ C0] tty_send_xchar+0x2fb/0x380 [ 1627.238022][ C0] ? tty_write_message+0x120/0x120 [ 1627.238026][ C0] ? __tty_check_change+0x81/0x490 [ 1627.238029][ C0] n_tty_ioctl_helper+0x192/0x3b0 [ 1627.238033][ C0] n_tty_ioctl+0x59/0x370 [ 1627.238036][ C0] ? ldsem_down_read+0x33/0x40 [ 1627.238039][ C0] tty_ioctl+0xaf9/0x14f0 [ 1627.238043][ C0] ? n_tty_receive_signal_char+0x120/0x120 [ 1627.238046][ C0] ? tty_vhangup+0x30/0x30 [ 1627.238050][ C0] ? tomoyo_path_number_perm+0x454/0x520 [ 1627.238054][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1627.238058][ C0] ? tomoyo_path_number_perm+0x25e/0x520 [ 1627.238062][ C0] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1627.238066][ C0] ? tty_vhangup+0x30/0x30 [ 1627.238069][ C0] do_vfs_ioctl+0x977/0x14e0 [ 1627.238073][ C0] ? compat_ioctl_preallocate+0x220/0x220 [ 1627.238076][ C0] ? __fget+0x37f/0x550 [ 1627.238079][ C0] ? ksys_dup3+0x3e0/0x3e0 [ 1627.238084][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1627.238087][ C0] ? fput_many+0x12c/0x1a0 [ 1627.238090][ C0] ? tomoyo_file_ioctl+0x23/0x30 [ 1627.238095][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1627.238098][ C0] ? security_file_ioctl+0x8d/0xc0 [ 1627.238101][ C0] ksys_ioctl+0xab/0xd0 [ 1627.238105][ C0] __x64_sys_ioctl+0x73/0xb0 [ 1627.238108][ C0] do_syscall_64+0xfa/0x790 [ 1627.238113][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.238115][ C0] RIP: 0033:0x45a849 [ 1627.238126][ C0] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1627.238130][ C0] RSP: 002b:00007f3b0e013c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1627.238139][ C0] RAX: ffffffffffffffda RBX: 00007f3b0e013c90 RCX: 000000000045a849 [ 1627.238144][ C0] RDX: 0000000000000003 RSI: 000000000000540a RDI: 0000000000000003 [ 1627.238149][ C0] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1627.238154][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b0e0146d4 [ 1627.238159][ C0] R13: 00000000004c5a00 R14: 00000000004dbc28 R15: 0000000000000005 [ 1627.459521][T29016] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1627.666011][T29020] kobject: 'bridge87' (00000000592cf233): kobject_add_internal: parent: 'net', set: 'devices' [ 1627.749037][ T4089] kobject: 'loop1' (000000002a4f7e4a): kobject_uevent_env [ 1628.003530][T29020] kobject: 'bridge87' (00000000592cf233): kobject_uevent_env [ 1628.006437][T29016] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000f5ff", 0x39}], 0x1) [ 1628.013443][T29020] kobject: 'bridge87' (00000000592cf233): fill_kobj_path: path = '/devices/virtual/net/bridge87' [ 1628.018843][ T4089] kobject: 'loop1' (000000002a4f7e4a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1628.020176][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1628.048174][T29020] kobject: 'queues' (00000000748b9477): kobject_add_internal: parent: 'bridge87', set: '' [ 1628.051454][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1628.053714][ T4089] kobject: 'loop4' (000000003cf7757a): kobject_uevent_env [ 1628.062016][T29020] kobject: 'queues' (00000000748b9477): kobject_uevent_env [ 1628.074832][ T4089] kobject: 'loop4' (000000003cf7757a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1628.090285][T29020] kobject: 'queues' (00000000748b9477): kobject_uevent_env: filter function caused the event to drop! [ 1628.124222][ T4089] kobject: 'loop3' (000000000265cb80): kobject_uevent_env [ 1628.124257][ T4089] kobject: 'loop3' (000000000265cb80): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1628.217041][T29020] kobject: 'rx-0' (000000004fcdf073): kobject_add_internal: parent: 'queues', set: 'queues' [ 1628.258518][ T4089] kobject: 'loop3' (000000000265cb80): kobject_uevent_env [ 1628.341529][T29041] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1628.342831][T29020] kobject: 'rx-0' (000000004fcdf073): kobject_uevent_env [ 1628.356791][T29041] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1628.368238][T29020] kobject: 'rx-0' (000000004fcdf073): fill_kobj_path: path = '/devices/virtual/net/bridge87/queues/rx-0' 22:36:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000fcff", 0x39}], 0x1) [ 1628.488789][ T4089] kobject: 'loop3' (000000000265cb80): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1628.548867][T29020] kobject: 'tx-0' (0000000070a13ed9): kobject_add_internal: parent: 'queues', set: 'queues' [ 1628.563485][T29046] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1628.603577][T29020] kobject: 'tx-0' (0000000070a13ed9): kobject_uevent_env [ 1628.611305][T29046] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1628.633421][T29020] kobject: 'tx-0' (0000000070a13ed9): fill_kobj_path: path = '/devices/virtual/net/bridge87/queues/tx-0' [ 1628.658056][T29020] kobject: 'brif' (00000000f669a4c7): kobject_add_internal: parent: 'bridge87', set: '' [ 1628.680574][T29020] kobject: 'batman_adv' (000000001706e3ab): kobject_add_internal: parent: 'bridge87', set: '' 22:36:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1628.718495][T29020] device bridge87 entered promiscuous mode [ 1628.725663][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1628.739713][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1628.756025][T29050] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1628.758901][T29025] FAULT_INJECTION: forcing a failure. [ 1628.758901][T29025] name failslab, interval 1, probability 0, space 0, times 0 22:36:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x505) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:27 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1628.812540][T29050] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1628.828762][T29025] CPU: 0 PID: 29025 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1628.837475][T29025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1628.847579][T29025] Call Trace: [ 1628.850892][T29025] dump_stack+0x197/0x210 [ 1628.855238][T29025] should_fail.cold+0xa/0x15 [ 1628.859836][T29025] ? __mutex_unlock_slowpath+0x2ff/0x6a0 [ 1628.865502][T29025] ? fault_create_debugfs_attr+0x180/0x180 [ 1628.871316][T29025] ? lock_downgrade+0x920/0x920 [ 1628.876173][T29025] ? lock_acquire+0x190/0x410 [ 1628.880889][T29025] ? ___might_sleep+0x163/0x2c0 [ 1628.885751][T29025] __should_failslab+0x121/0x190 [ 1628.890700][T29025] should_failslab+0x9/0x14 [ 1628.895233][T29025] kmem_cache_alloc_node+0x268/0x740 [ 1628.900527][T29025] ? netdev_run_todo+0x553/0x7d0 [ 1628.905477][T29025] __alloc_skb+0xd5/0x5e0 [ 1628.909816][T29025] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1628.915373][T29025] ? __rtnl_newlink+0x1790/0x1790 [ 1628.920410][T29025] netlink_ack+0x25c/0xb50 [ 1628.924837][T29025] ? netlink_sendmsg+0xea0/0xea0 [ 1628.929791][T29025] ? __copy_skb_header+0x260/0x5e0 [ 1628.934914][T29025] netlink_rcv_skb+0x376/0x450 [ 1628.939687][T29025] ? rtnl_bridge_getlink+0x910/0x910 [ 1628.945419][T29025] ? netlink_ack+0xb50/0xb50 [ 1628.950017][T29025] ? netlink_deliver_tap+0x24a/0xbe0 [ 1628.955308][T29025] rtnetlink_rcv+0x1d/0x30 [ 1628.959728][T29025] netlink_unicast+0x58c/0x7d0 [ 1628.964497][T29025] ? netlink_attachskb+0x870/0x870 [ 1628.969629][T29025] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1628.975353][T29025] ? __check_object_size+0x3d/0x437 [ 1628.980563][T29025] netlink_sendmsg+0x91c/0xea0 [ 1628.985335][T29025] ? netlink_unicast+0x7d0/0x7d0 [ 1628.990295][T29025] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1628.995855][T29025] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1629.001317][T29025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1629.007588][T29025] ? security_socket_sendmsg+0x8d/0xc0 [ 1629.013189][T29025] ? netlink_unicast+0x7d0/0x7d0 [ 1629.018145][T29025] sock_sendmsg+0xd7/0x130 [ 1629.022598][T29025] ____sys_sendmsg+0x753/0x880 [ 1629.027397][T29025] ? kernel_sendmsg+0x50/0x50 [ 1629.032097][T29025] ___sys_sendmsg+0x100/0x170 [ 1629.036797][T29025] ? sendmsg_copy_msghdr+0x70/0x70 [ 1629.041936][T29025] ? __fget+0x37f/0x550 [ 1629.046104][T29025] ? ksys_dup3+0x3e0/0x3e0 [ 1629.056361][T29025] ? __fget_light+0x1a9/0x230 [ 1629.061049][T29025] ? __fdget+0x1b/0x20 [ 1629.065124][T29025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1629.071377][T29025] __sys_sendmsg+0x105/0x1d0 [ 1629.075959][T29025] ? __sys_sendmsg_sock+0xc0/0xc0 [ 1629.080984][T29025] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1629.087043][T29025] __x64_sys_sendmsg+0x78/0xb0 [ 1629.091795][T29025] do_syscall_64+0xfa/0x790 [ 1629.096290][T29025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1629.102164][T29025] RIP: 0033:0x45a849 [ 1629.106047][T29025] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1629.125656][T29025] RSP: 002b:00007f9c20587c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1629.134057][T29025] RAX: ffffffffffffffda RBX: 00007f9c20587c90 RCX: 000000000045a849 [ 1629.142016][T29025] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1629.149991][T29025] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1629.157956][T29025] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c205886d4 [ 1629.165912][T29025] R13: 00000000004c9985 R14: 00000000004e1778 R15: 0000000000000006 [ 1629.177332][ T4089] kobject: 'loop1' (000000002a4f7e4a): kobject_uevent_env [ 1629.200733][ T4089] kobject: 'loop1' (000000002a4f7e4a): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:36:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000040)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:36:28 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x45], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0004060000feff800000003a4288443e7ff09b5ed7750700feff162d0201008cfe6d40fedc00000075c4171f001b4f36366194335b71e5fe003b40040000710e134c2a7b9db52376591a7a71e8b8e01db2e9b638096e6c582a66a2279a6f3d82dd1f2c27283c2b9fdb90109e6697fa878514e8277f16bedd18081374ea271190fdda477c053c82cf881194fae73ec1a838a8edeb69fa40103c110d5535bd2d886c53250d51a6279441c1adcda2b01a51c324b9d87b206bba083a1a0fb8cbfdfb48b6a6c5f16162f77ad1478ac098f8a217924e062dbd81c4460ec487f4b0723dd071d60a69e32a19ba723141e536d880b600e7a976b5a8d2c17c1e0764e201a554080057191ea805dc590775526f9e911393494a1d33f1e6ce190f389d990b6f1cecf6e3801af8fe78b45cf33a64bb47b8b9bae67ce7fdf5ddf8f1bdb9f84999953ae90867185c38d5446925c20300000000000000392a032328fcaf1fa4046db3e358503e4a1861f7b5132204614e51a91990cbed370be7a51a1603f6259b275080f4ddf59da885ca3e9b461132125ee8d880bbb1084a4307caee6a509af879ec047276b4709dbf104584c794f6f60543b0285e8a8b419b73e885c1c8907199f7a98e78bd040000000000000056dbf7a3c023a47ddcb9b4b978331f7020cd901bffd7b972d06a9c28979b001524949d69bd2bc792fd32f8f7a300000000000000000000000000000000ccf6a66f86d7e51f54bf105c16d62880408ac4e6806ff9e857f1a8cdfaa4f5a1fd4bbf7f3aeb28c2834b4f5845c44513d593598b9785da82c52d9a93853aa56bca5a8200fa44e1fe2f449e223821357165ea298737a35e116448a3d12fe7af14e2ce456fe53fb40012a96c56fc0a46809bfa5f9b3dcf194c2ed024"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = dup2(0xffffffffffffffff, r0) ioctl$TCXONC(r1, 0x540a, 0x3) 22:36:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e0001000600034800000000000000ffff", 0x39}], 0x1) [ 1629.222379][ T4089] kobject: 'loop5' (000000006e3983ee): kobject_uevent_env [ 1629.240887][ T4089] kobject: 'loop5' (000000006e3983ee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1629.272487][ T4089] kobject: 'loop1' (000000002a4f7e4a): kobject_uevent_env [ 1629.281800][ T4089] kobject: 'loop1' (000000002a4f7e4a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1629.303036][T29062] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1629.309316][ T4089] kobject: 'loop3' (000000000265cb80): kobject_uevent_env [ 1629.318479][ T4089] kobject: 'loop3' (000000000265cb80): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1629.333966][T29062] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1629.365703][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1629.393380][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1629.434394][ T4089] kobject: 'loop0' (000000009bfb8ede): kobject_uevent_env [ 1629.459408][ T4089] kobject: 'loop0' (000000009bfb8ede): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:36:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) 22:36:28 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x60], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1629.490007][ T4089] kobject: 'loop1' (000000002a4f7e4a): kobject_uevent_env [ 1629.497213][ T4089] kobject: 'loop1' (000000002a4f7e4a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1629.509826][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1629.516994][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1629.531456][T29075] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1629.557799][ T4089] kobject: 'loop4' (000000003cf7757a): kobject_uevent_env [ 1629.565134][T29075] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1629.584209][ T4089] kobject: 'loop4' (000000003cf7757a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1629.610967][T29081] kobject: 'bridge88' (0000000013c25338): kobject_add_internal: parent: 'net', set: 'devices' 22:36:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:28 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1629.688597][T29081] kobject: 'bridge88' (0000000013c25338): kobject_uevent_env [ 1629.718791][ C1] net_ratelimit: 16 callbacks suppressed [ 1629.718798][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1629.730425][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:36:28 executing program 0: prctl$PR_SET_TIMERSLACK(0x1d, 0xd3c6) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1629.736300][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1629.742221][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1629.778409][T29081] kobject: 'bridge88' (0000000013c25338): fill_kobj_path: path = '/devices/virtual/net/bridge88' [ 1629.809570][ T4089] kobject: 'loop0' (000000009bfb8ede): kobject_uevent_env [ 1629.811487][T29094] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1629.816798][ T4089] kobject: 'loop0' (000000009bfb8ede): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1629.836087][T29094] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1629.909013][T29081] kobject: 'queues' (0000000068aca502): kobject_add_internal: parent: 'bridge88', set: '' [ 1629.927660][T29081] kobject: 'queues' (0000000068aca502): kobject_uevent_env [ 1629.928122][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1629.939717][T29081] kobject: 'queues' (0000000068aca502): kobject_uevent_env: filter function caused the event to drop! [ 1629.959920][T29081] kobject: 'rx-0' (0000000030da4402): kobject_add_internal: parent: 'queues', set: 'queues' [ 1629.965004][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1629.976981][T29081] kobject: 'rx-0' (0000000030da4402): kobject_uevent_env [ 1629.990727][T29081] kobject: 'rx-0' (0000000030da4402): fill_kobj_path: path = '/devices/virtual/net/bridge88/queues/rx-0' [ 1630.009028][T29081] kobject: 'tx-0' (000000007256d7a8): kobject_add_internal: parent: 'queues', set: 'queues' [ 1630.025129][T29081] kobject: 'tx-0' (000000007256d7a8): kobject_uevent_env [ 1630.035864][T29081] kobject: 'tx-0' (000000007256d7a8): fill_kobj_path: path = '/devices/virtual/net/bridge88/queues/tx-0' [ 1630.055808][T29081] kobject: 'brif' (0000000099964ba1): kobject_add_internal: parent: 'bridge88', set: '' [ 1630.073554][T29081] kobject: 'batman_adv' (000000001dbde034): kobject_add_internal: parent: 'bridge88', set: '' [ 1630.094250][T29081] device bridge88 entered promiscuous mode 22:36:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x506) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000900)=ANY=[@ANYBLOB="0004060000feff800000003a4288443e7ff09b5ed7750700feff162d0201008cfe6d40fedc00000075c4171f001b4f36366194335b71e5fe003b40040000710e134c2a7b9db52376591a7a71e8b8e01db2e9b638096e6c582a66a2279a6f3d82dd1f2c27283c2b9fdb90109e6697fa878514e8277f16bedd18081374ea271190fdda477c053c82cf881194fae73ec1a838a8edeb69fa40103c110d5535bd2d886c53250d51a6279441c1adcda2b01a51c324b9d87b206bba083a1a0fb8cbfdfb48b6a6c5f16162f77ad1478ac098f8a217924e062dbd81c4460ec487f4b0723dd071d60a69e32a19ba723141e536d880b600e7a976b5a8d2c17c1e0764e201a554080057191ea805dc590775526f9e911393494a1d33f1e6ce190f389d990b6f1cecf6e3801af8fe78b45cf33a64bb47b8b9bae67ce7fdf5ddf8f1bdb9f84999953ae90867185c38d5446925c20300000000000000392a032328fcaf1fa4046db3e358503e4a1861f7b5132204614e51a91990cbed370be7a51a1603f6259b275080f4ddf59da885ca3e9b461132125ee8d880bbb1084a4307caee6a509af879ec047276b4709dbf104584c794f6f60543b0285e8a8b41c573e885c1c8907199f7a98e78bd040000000000000056dbf7a3c023a47ddcb9b4b978331f7020cd901bffd7b972d06a9c28979b001524949d69bd2bc792fd32f8f7a300000000000000000000000000000000ccf6a66f86d7e51f54bf105c16d62880408ac4e6806ff9e857f1a8cdfaa4f5a1fd4bbf7f3aeb28c2834b4f5845c44513d593598b9785da82c52d9a93853aa56bca5a8200fa44e1fe2f449e223821357165ea298737a35e116448a3d12fe7af14e2ce456fe53fb40012a96c56fc0a46809bfa5f9b3dcf194c2ed0248baaab15830c425452e5b9ece150f23238bdae53dd7bd395f0ee98769eafce62c5bbb69ed90ee6d95fb2c3f0c9ccdff025755ce053c0da5ef13c15ff5911865940093e1742626672f54345ea9ab4d3d1f4e3850cf91fc431e7dbff531d386d87fae920ed0d41518a2bb2b878bdee22fccffe5e1e406be67ffdfbc0fb75e7233ccfe378fa99554dd4acce3d35c6ec0b6439d684baeb1f8becf4b8cfbe07aafe97f5"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 22:36:29 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) [ 1630.162853][ T4089] kobject: 'loop1' (000000002a4f7e4a): kobject_uevent_env [ 1630.194069][T29109] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1630.219597][ T4089] kobject: 'loop1' (000000002a4f7e4a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1630.239864][T29109] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 22:36:29 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1630.279690][ T4089] kobject: 'loop5' (000000006e3983ee): kobject_uevent_env [ 1630.282184][T29117] kobject: 'bridge89' (000000006c1afbfc): kobject_add_internal: parent: 'net', set: 'devices' [ 1630.286901][ T4089] kobject: 'loop5' (000000006e3983ee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1630.339734][T29117] kobject: 'bridge89' (000000006c1afbfc): kobject_uevent_env [ 1630.361302][T29117] kobject: 'bridge89' (000000006c1afbfc): fill_kobj_path: path = '/devices/virtual/net/bridge89' [ 1630.373290][T29109] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1630.373644][ T4089] kobject: 'loop3' (000000000265cb80): kobject_uevent_env 22:36:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"/615], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x10000, 0x10, 0x0, 0x9, 0x0, 0x0, 0x10000000}) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xe84, 0x44d00) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000080)=""/91) r3 = dup2(r1, r0) r4 = socket(0x0, 0x5, 0x0) r5 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r7 = dup2(r6, r5) ppoll(&(0x7f0000000600)=[{r7, 0x180}], 0x1, 0x0, 0x0, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) bind$can_j1939(r4, &(0x7f0000000180)={0x1d, r8, 0x3, {0x7, 0xf0, 0x3}, 0x2}, 0x18) ioctl$TCXONC(r3, 0x540a, 0x3) [ 1630.391667][ T4089] kobject: 'loop3' (000000000265cb80): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1630.392994][T29109] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1630.410069][ T4089] kobject: 'loop4' (000000003cf7757a): kobject_uevent_env [ 1630.418460][ T4089] kobject: 'loop4' (000000003cf7757a): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:36:29 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x1, 0x200001) setsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000040)="acb8eeb72ff07a461bc459a85253e5da552b34507f745a5561118ba1ce3f17449806d82d6e06c557acd8648366bbff7a884ba61a756009", 0x37) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 1630.449632][T29117] kobject: 'queues' (00000000c4d9d16e): kobject_add_internal: parent: 'bridge89', set: '' [ 1630.477007][ T4089] kobject: 'loop3' (000000000265cb80): kobject_uevent_env [ 1630.489048][T29117] kobject: 'queues' (00000000c4d9d16e): kobject_uevent_env 22:36:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1630.503342][T29117] kobject: 'queues' (00000000c4d9d16e): kobject_uevent_env: filter function caused the event to drop! [ 1630.505284][ T4089] kobject: 'loop3' (000000000265cb80): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1630.532455][T29117] kobject: 'rx-0' (00000000be0e6063): kobject_add_internal: parent: 'queues', set: 'queues' [ 1630.556865][T29134] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1630.564582][T29117] kobject: 'rx-0' (00000000be0e6063): kobject_uevent_env [ 1630.567901][ T4089] kobject: 'loop0' (000000009bfb8ede): kobject_uevent_env [ 1630.578005][T29117] kobject: 'rx-0' (00000000be0e6063): fill_kobj_path: path = '/devices/virtual/net/bridge89/queues/rx-0' [ 1630.579444][T29134] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1630.601814][T29117] kobject: 'tx-0' (00000000513f5794): kobject_add_internal: parent: 'queues', set: 'queues' [ 1630.601958][ T4089] kobject: 'loop0' (000000009bfb8ede): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1630.622920][T29117] kobject: 'tx-0' (00000000513f5794): kobject_uevent_env [ 1630.639898][T29117] kobject: 'tx-0' (00000000513f5794): fill_kobj_path: path = '/devices/virtual/net/bridge89/queues/tx-0' [ 1630.646174][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1630.665440][T29117] kobject: 'brif' (0000000058f99cca): kobject_add_internal: parent: 'bridge89', set: '' [ 1630.667248][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1630.686117][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1630.686175][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:36:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1630.694187][T29117] kobject: 'batman_adv' (00000000d6119758): kobject_add_internal: parent: 'bridge89', set: '' [ 1630.727744][T29117] device bridge89 entered promiscuous mode 22:36:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:29 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) [ 1630.763164][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1630.790495][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1630.866022][ T4089] kobject: 'loop1' (000000002a4f7e4a): kobject_uevent_env [ 1630.884525][ T4089] kobject: 'loop1' (000000002a4f7e4a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1630.946646][ T4089] kobject: 'loop4' (000000003cf7757a): kobject_uevent_env [ 1630.982036][ T4089] kobject: 'loop4' (000000003cf7757a): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:36:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x507) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) 22:36:30 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:30 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x100, 0x0, @dev, 0x8000}, {0xa, 0xffff, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400]}, 0x5c) [ 1631.027960][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1631.044002][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1631.109046][ T4089] kobject: 'loop5' (000000006e3983ee): kobject_uevent_env [ 1631.121391][T29161] kobject: 'bridge90' (00000000f74d3eb7): kobject_add_internal: parent: 'net', set: 'devices' [ 1631.122830][ T4089] kobject: 'loop5' (000000006e3983ee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1631.154877][T29161] kobject: 'bridge90' (00000000f74d3eb7): kobject_uevent_env [ 1631.162463][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1631.162517][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1631.162607][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1631.162649][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1631.174695][ T4089] kobject: 'loop0' (000000009bfb8ede): kobject_uevent_env 22:36:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1631.212392][T29161] kobject: 'bridge90' (00000000f74d3eb7): fill_kobj_path: path = '/devices/virtual/net/bridge90' [ 1631.239132][ T4089] kobject: 'loop0' (000000009bfb8ede): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1631.255174][T29161] kobject: 'queues' (00000000c0d309a2): kobject_add_internal: parent: 'bridge90', set: '' [ 1631.305017][T29161] kobject: 'queues' (00000000c0d309a2): kobject_uevent_env [ 1631.315571][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env 22:36:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1631.348650][T29161] kobject: 'queues' (00000000c0d309a2): kobject_uevent_env: filter function caused the event to drop! [ 1631.364623][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1631.385215][ T4089] kobject: 'loop3' (000000000265cb80): kobject_uevent_env 22:36:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) syz_open_pts(r0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) r4 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r5, r4) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r7 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r8 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r10 = dup2(r9, r8) ppoll(&(0x7f0000000600)=[{r10, 0x180}], 0x1, 0x0, 0x0, 0x0) ioctl$BLKTRACESTART(r10, 0x1274, 0x0) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r11, r7) r12 = socket$rds(0x15, 0x5, 0x0) fsetxattr$security_capability(r12, &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v1={0x1000000, [{0x3, 0xa3c4}]}, 0xc, 0x3) fsetxattr$security_capability(r7, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x6, 0xff}, {0x1, 0x10001}]}, 0x14, 0x3) r13 = dup2(r6, 0xffffffffffffffff) ppoll(&(0x7f0000000600)=[{r13, 0x180}], 0x1, 0x0, 0x0, 0x0) r14 = dup2(r5, r13) ioctl$TCXONC(r14, 0x540a, 0x3) [ 1631.404409][T29161] kobject: 'rx-0' (0000000083d0326f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1631.432516][ T4089] kobject: 'loop3' (000000000265cb80): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1631.452932][T29161] kobject: 'rx-0' (0000000083d0326f): kobject_uevent_env 22:36:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1631.504231][T29161] kobject: 'rx-0' (0000000083d0326f): fill_kobj_path: path = '/devices/virtual/net/bridge90/queues/rx-0' [ 1631.528009][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1631.545347][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1631.576542][T29161] kobject: 'tx-0' (00000000c891635b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1631.592096][T29161] kobject: 'tx-0' (00000000c891635b): kobject_uevent_env [ 1631.602369][T29161] kobject: 'tx-0' (00000000c891635b): fill_kobj_path: path = '/devices/virtual/net/bridge90/queues/tx-0' 22:36:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1631.618501][T29161] kobject: 'brif' (000000007aba52f2): kobject_add_internal: parent: 'bridge90', set: '' [ 1631.664195][T29161] kobject: 'batman_adv' (000000005dc0b4e7): kobject_add_internal: parent: 'bridge90', set: '' [ 1631.679901][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1631.687076][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:36:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1631.726665][T29161] device bridge90 entered promiscuous mode 22:36:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) [ 1631.789237][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1631.796457][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1631.860053][ T4089] kobject: 'loop4' (000000003cf7757a): kobject_uevent_env [ 1631.889641][ T4089] kobject: 'loop4' (000000003cf7757a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1631.896327][T29202] kobject: 'bridge91' (00000000a2b92b05): kobject_add_internal: parent: 'net', set: 'devices' [ 1631.926576][ T4089] kobject: 'loop1' (000000002a4f7e4a): kobject_uevent_env [ 1631.939368][ T4089] kobject: 'loop1' (000000002a4f7e4a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1631.949920][T29202] kobject: 'bridge91' (00000000a2b92b05): kobject_uevent_env [ 1631.974399][ T4089] kobject: 'loop0' (000000009bfb8ede): kobject_uevent_env [ 1631.976967][T29202] kobject: 'bridge91' (00000000a2b92b05): fill_kobj_path: path = '/devices/virtual/net/bridge91' [ 1631.981714][ T4089] kobject: 'loop0' (000000009bfb8ede): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1632.020839][T29202] kobject: 'queues' (00000000a4c531c7): kobject_add_internal: parent: 'bridge91', set: '' [ 1632.053496][T29202] kobject: 'queues' (00000000a4c531c7): kobject_uevent_env [ 1632.074384][T29202] kobject: 'queues' (00000000a4c531c7): kobject_uevent_env: filter function caused the event to drop! [ 1632.101977][T29202] kobject: 'rx-0' (000000004f5658e5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1632.118901][T29202] kobject: 'rx-0' (000000004f5658e5): kobject_uevent_env [ 1632.128881][T29202] kobject: 'rx-0' (000000004f5658e5): fill_kobj_path: path = '/devices/virtual/net/bridge91/queues/rx-0' [ 1632.158910][T29202] kobject: 'tx-0' (0000000014572015): kobject_add_internal: parent: 'queues', set: 'queues' [ 1632.178972][T29202] kobject: 'tx-0' (0000000014572015): kobject_uevent_env [ 1632.186115][T29202] kobject: 'tx-0' (0000000014572015): fill_kobj_path: path = '/devices/virtual/net/bridge91/queues/tx-0' [ 1632.210406][T29202] kobject: 'brif' (000000004b585cc5): kobject_add_internal: parent: 'bridge91', set: '' [ 1632.229423][T29202] kobject: 'batman_adv' (000000002949d740): kobject_add_internal: parent: 'bridge91', set: '' [ 1632.250198][T29202] device bridge91 entered promiscuous mode 22:36:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x50e) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:31 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) 22:36:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x7, 0x0, @dev}, {0xa, 0x0, 0x0, @rand_addr="466a4efb369def80e9315ac6b171d080"}, 0x0, [0x0, 0x20000, 0x2cc, 0xffffffff, 0x0, 0x5, 0x4662d1c5]}, 0x5c) r1 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, r1) ppoll(&(0x7f0000000600)=[{r3, 0x180}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6, 0x0, 0xfd, 0xc, 0x3, 0x8000}, 0x20) 22:36:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67efc5903f85e6d515be29c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222c000817ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707ef3cbaa35f37d3d4c2088b4d2bfdc62430ddb444fd045e55d9ab11aac8f1d06047be6ef6447d95179ebcde8115fda509b7a088f1040b29c6340decdb60e326fe837d15ff50a8c5fb76476d2b22a1c53ba4c48dfa1502dd914d1c9804caa11d4af64886f2105eed98eb3ae305c84d16e6b104a4ecbb50d52ae5ca1eb190ce14590172688cfbd2abfe29e3fcd67572e55534f7ad8512f9052e540bfeec90e129facad3550a78a41749bce5b1c8c79e73e262a79475eb55dba19eaab6b0bc53a7c15d6a65"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) 22:36:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1632.327565][ T4089] kobject: 'loop5' (000000006e3983ee): kobject_uevent_env [ 1632.350051][ T4089] kobject: 'loop5' (000000006e3983ee): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:36:31 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575e75f7fb786b88748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d197ee44a77665182883237a8ab1c501c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b134709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc5d53528a5c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5229d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c68dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a37672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b014784c7cf472a0720c0fa7302e041866374b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87dbf5cc864aef92b52a486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a9de30158ac98d50aaef479ba1234fcabf4f568c0bd6d0855cd0b4eae577c54f625cbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c0f1fe2189b489503a3faa51640dd24084a992fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce305a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@local, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r6, r7}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x200, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x200, 0x81, 0x987, 0x500, 0x4, 0x1260302, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x5f7, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0xd2, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 22:36:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x442100, 0x0) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000040)) ioctl$TCXONC(r2, 0x540a, 0x3) [ 1632.416797][T29223] kobject: 'bridge92' (00000000cfc7765a): kobject_add_internal: parent: 'net', set: 'devices' [ 1632.428520][ T4089] kobject: 'loop4' (000000003cf7757a): kobject_uevent_env [ 1632.439054][ T4089] kobject: 'loop4' (000000003cf7757a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1632.474143][T29229] validate_nla: 9 callbacks suppressed [ 1632.474153][T29229] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1632.480050][T29223] kobject: 'bridge92' (00000000cfc7765a): kobject_uevent_env [ 1632.505537][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1632.541791][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1632.552481][T29223] kobject: 'bridge92' (00000000cfc7765a): fill_kobj_path: path = '/devices/virtual/net/bridge92' [ 1632.573283][ T4089] kobject: 'loop1' (000000002a4f7e4a): kobject_uevent_env [ 1632.580718][T29223] kobject: 'queues' (000000004be33153): kobject_add_internal: parent: 'bridge92', set: '' 22:36:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1632.592762][ T4089] kobject: 'loop1' (000000002a4f7e4a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1632.603168][T29223] kobject: 'queues' (000000004be33153): kobject_uevent_env [ 1632.614313][ T4089] kobject: 'loop3' (000000000265cb80): kobject_uevent_env [ 1632.621641][T29223] kobject: 'queues' (000000004be33153): kobject_uevent_env: filter function caused the event to drop! 22:36:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0004060000feff800000003a4288443e7ff09b5ed7750700feff162d0201008cfe6d40fedc00000075c4171f001b4f36366194335b71e5fe003b40040000710e134c2a7b9db52376591a7a71e8b8e01db2e9b638096e6c582a66a2279a6f3d82dd1f2c27283c2b9fdb90109e6697fa878514e8277f16bedd18081374ea271190fdda477c053c82cf881194fae73ec1a838a8edeb69fa40103c110d5535bd2d886c53250d51a6279441c1adcda2b01a51c324b9d87b206bba083a1a0fb8cbfdfb48b6a6c5f16162f77ad1478ac098f8a217924e062dbd81c4460ec487f4b0723dd071d60a69e32a19ba723141e536d880b600e7a976b5a8d2c17c1e0764e201a554080057191ea805dc590775526f9e911393494a1d33f1e6ce190f389d990b6f1cecf6e3801af8fe78b45cf33a64bb47b8b9bae67ce7fdf5ddf8f1bdb9f84999953ae90867185c38d5446925c20300000000000000392a032328fcaf1fa4046db3e358503e4a1861f7b5132204614e51a91990cbed370be7a51a1603f6259b275080f4ddf59da885ca3e9b461132125ee8d880bbb1084a4307caee6a509af879ec047276b4709dbf104584c794f6f60543b0285e8a8b419b73e885c1c8907199f7a98e78bd040000000000000056dbf7a3c023a47ddcb9b4b978331f7020cd901bffd7b972d06a9c28979b001524949d69bd2bc792fd32f8f7a300000000000000000000000000000000ccf6a66f86d7e51f54bf105c16d62880408ac4e6806ff9e857f1a8cdfaa4f5a1fd4bbf7f3aeb28c2834b4f5845c44513d593598b9785da82c52d9a93853aa56bca5a8200fa44e1fe2f449e223821357165ea298737a35e116448a3d12fe7af14e2ce456fe53fb40012a96c56fc0a46809bfa5f9b3dcf194c2ed024"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x40}) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 1632.636495][ T4089] kobject: 'loop3' (000000000265cb80): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1632.648884][T29223] kobject: 'rx-0' (000000000e3f3410): kobject_add_internal: parent: 'queues', set: 'queues' [ 1632.677339][T29241] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1632.684968][T29223] kobject: 'rx-0' (000000000e3f3410): kobject_uevent_env [ 1632.715790][T29223] kobject: 'rx-0' (000000000e3f3410): fill_kobj_path: path = '/devices/virtual/net/bridge92/queues/rx-0' [ 1632.734638][T29223] kobject: 'tx-0' (00000000b870e24e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1632.747036][T29223] kobject: 'tx-0' (00000000b870e24e): kobject_uevent_env 22:36:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306050368fe07602b00003f0e430a0014000b0045b300070300000319001a00120002000e00010006000348000000000000000000", 0x39}], 0x1) [ 1632.755859][T29223] kobject: 'tx-0' (00000000b870e24e): fill_kobj_path: path = '/devices/virtual/net/bridge92/queues/tx-0' [ 1632.773884][T29223] kobject: 'brif' (000000009198c1f1): kobject_add_internal: parent: 'bridge92', set: '' [ 1632.790720][T29223] kobject: 'batman_adv' (00000000409ef755): kobject_add_internal: parent: 'bridge92', set: '' [ 1632.808982][T29223] device bridge92 entered promiscuous mode 22:36:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge_slave_1\x00', 0x1}) ioctl$TCXONC(r2, 0x540a, 0x3) [ 1632.827653][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1632.849981][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1632.854726][T29254] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1632.911020][ T4089] kobject: 'loop3' (000000000265cb80): kobject_uevent_env [ 1632.918210][ T4089] kobject: 'loop3' (000000000265cb80): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1632.983909][ T4089] kobject: 'loop1' (000000002a4f7e4a): kobject_uevent_env [ 1633.011395][ T4089] kobject: 'loop1' (000000002a4f7e4a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1633.040125][ T4089] kobject: 'loop4' (000000003cf7757a): kobject_uevent_env [ 1633.047308][ T4089] kobject: 'loop4' (000000003cf7757a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1633.078454][ T4089] kobject: 'loop2' (0000000077aca7f9): kobject_uevent_env [ 1633.101124][ T4089] kobject: 'loop2' (0000000077aca7f9): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:36:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{0x0, 0xcffe0000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x140000}], 0x1fc, 0x0, 0x0, 0x3}, 0x3400}], 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendfile(r1, r0, 0x0, 0x510) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:36:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7