0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000280)=""/224, 0xe0}, {&(0x7f0000000380)=""/251, 0xfb}, {&(0x7f0000000080)=""/123, 0x7b}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000480)=""/37, 0x25}], 0x5, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) r7 = dup(r6) io_submit(0x0, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.net/syz1\x00', 0x200002, 0x0) io_submit(0x0, 0x1, &(0x7f0000000740)=[&(0x7f0000000700)={0x0, 0x0, 0x0, 0x8, 0x9, r8, &(0x7f00000006c0)="d9051dd38d46be80dbc3be5c03376cc7c600ac1bbddf8db85fccc51ba39d26a57280fce5951bb94cf2bb8481e92b3faf9457a290a0366c9cb7d65a2dfb", 0x3d, 0x3, 0x0, 0x2}]) ioctl$BLKZEROOUT(r7, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$sock_qrtr_SIOCGIFADDR(r7, 0x8915, &(0x7f0000000240)={'veth1_to_bridge\x00', {0x2a, 0x3, 0x4001}}) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000)='wireguard\x00') [ 2936.127885][ T5558] tipc: Not found cipher: "gcm("! [ 2936.135159][ T5563] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2936.162433][ T5563] device bond124 entered promiscuous mode 01:21:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x4000) [ 2936.181938][ T5566] tipc: Not found cipher: "gcm("! [ 2936.282452][ T5608] tipc: Not found cipher: "gcm("! [ 2936.297436][ T5568] bond124: (slave bridge151): making interface the new active one [ 2936.305989][ T5568] device bridge151 entered promiscuous mode [ 2936.312604][ T5568] bond124: (slave bridge151): Enslaving as an active interface with an up link [ 2936.336949][ T5612] tipc: Not found cipher: "gcm("! [ 2936.343444][ T5568] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2936.376075][ T5563] bond124: (slave bridge152): Enslaving as a backup interface with an up link 01:21:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x2, 0x21) 01:21:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x2ff, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:34 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x6, 0x2) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000140)={0x1, 0x3}, 0x2) 01:21:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x501a) 01:21:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x403, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x1000000, 0x21) 01:21:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x300, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2938.881274][ T5637] tipc: Not found cipher: "gcm("! [ 2938.886398][ T5641] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2938.934731][ T5641] device bond125 entered promiscuous mode [ 2938.943248][ T5652] tipc: Not found cipher: "gcm("! 01:21:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x5f00) [ 2938.981110][ T5654] bond125: (slave bridge153): making interface the new active one [ 2939.005416][ T5654] device bridge153 entered promiscuous mode 01:21:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x500, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2939.023280][ T5654] bond125: (slave bridge153): Enslaving as an active interface with an up link [ 2939.097201][ T5700] tipc: Not found cipher: "gcm("! [ 2939.103478][ T5641] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2939.126680][ T5654] bond125: (slave bridge154): Enslaving as a backup interface with an up link 01:21:35 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x34, r2, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}]}, 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x80, r2, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x3e, 0x5, "e85819de72415c54ccd3b232ebcd82510588ec84296344b5f221893acd9c70da940e57ff837451d7d0efba69086f731c8718253c87b0f6118e9e"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4044000}, 0x24008001) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r4 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r5 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/141, 0x8d}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x2006, &(0x7f0000003700)={0x77359400}) [ 2939.168913][ T5710] tipc: Not found cipher: "gcm("! 01:21:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x600, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xf000) 01:21:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x500, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2939.296895][ T5720] tipc: Not found cipher: "gcm("! [ 2939.303972][ T5723] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 2939.343338][ T5730] tipc: Not found cipher: "gcm("! [ 2939.348862][ T5731] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2939.402471][ T5731] device bond126 entered promiscuous mode [ 2939.432097][ T5739] bond126: (slave bridge155): making interface the new active one [ 2939.440461][ T5739] device bridge155 entered promiscuous mode [ 2939.447094][ T5739] bond126: (slave bridge155): Enslaving as an active interface with an up link [ 2939.476294][ T5731] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2939.501487][ T5739] bond126: (slave bridge156): Enslaving as a backup interface with an up link 01:21:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x20000) 01:21:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x700, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:37 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r3 = syz_open_dev$usbfs(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000180)={0x4, 0x43, 0x5, r3, 0x0, &(0x7f0000000140)={0xa10903, 0x9, [], @p_u8=&(0x7f0000000000)=0x6}}) ioctl$DRM_IOCTL_MODE_CURSOR2(r4, 0xc02464bb, &(0x7f00000001c0)={0x1, 0x25, 0x8001, 0x9, 0x9, 0x503, 0x4a, 0x3, 0x9}) 01:21:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x600, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x2000000, 0x21) [ 2941.950373][ T5785] tipc: Not found cipher: "gcm("! [ 2941.955694][ T5786] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2941.999832][ T5786] device bond127 entered promiscuous mode [ 2942.027612][ T5800] bond127: (slave bridge157): making interface the new active one [ 2942.036521][ T5800] device bridge157 entered promiscuous mode 01:21:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x900, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x30000) [ 2942.059159][ T5800] bond127: (slave bridge157): Enslaving as an active interface with an up link [ 2942.068959][ T5802] tipc: Not found cipher: "gcm("! [ 2942.086279][ T5786] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2942.147637][ T5800] bond127: (slave bridge158): Enslaving as a backup interface with an up link 01:21:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x700, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:38 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r4}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYBLOB="0000000000400000280012800b000100697036746e6c000018000280140002002001000000000000000000000000000008000a00", @ANYRES32=r7, @ANYBLOB="170caa6fffa0c5ff03000000000000352abfefc15528fa0e09feb5d500"/44], 0x58}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r2, &(0x7f0000000a80)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000a40)={&(0x7f0000000800)={0x210, 0x0, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x1}, 0x4000840) r8 = dup(r3) dup(r8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r8, 0xc040564a, &(0x7f0000000000)={0xd8, 0x0, 0x3011, 0x4, 0xfffffffb, 0xffffffff, 0xa3bc, 0x1}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 2942.269871][ T5851] tipc: Not found cipher: "gcm("! [ 2942.275237][ T5859] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2942.311933][ T5859] device bond128 entered promiscuous mode [ 2942.326408][ T5867] tipc: Not found cipher: "gcm("! 01:21:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xa00, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x34000) [ 2942.387130][ T5898] bond128: (slave bridge159): making interface the new active one [ 2942.401156][ T5898] device bridge159 entered promiscuous mode [ 2942.408845][ T5898] bond128: (slave bridge159): Enslaving as an active interface with an up link [ 2942.425494][ T5859] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2942.456607][ T5898] bond128: (slave bridge160): Enslaving as a backup interface with an up link [ 2942.516559][ T5915] tipc: Not found cipher: "gcm("! [ 2942.563939][ T5922] tipc: Not found cipher: "gcm("! 01:21:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:40 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000000)={0x40, 0x1, 0x1}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:21:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x900, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x400300) 01:21:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xc00, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x100000000000000, 0x21) [ 2945.022695][ T5939] tipc: Not found cipher: "gcm("! [ 2945.029563][ T5940] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:41 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 2945.067433][ T5940] device bond129 entered promiscuous mode [ 2945.085136][ T5955] bond129: (slave bridge161): making interface the new active one [ 2945.106995][ T5955] device bridge161 entered promiscuous mode 01:21:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x1200, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2945.136017][ T5955] bond129: (slave bridge161): Enslaving as an active interface with an up link [ 2945.153961][ T5959] tipc: Not found cipher: "gcm("! [ 2945.165372][ T5940] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xf0ffff) [ 2945.219213][ T5955] bond129: (slave bridge162): Enslaving as a backup interface with an up link 01:21:41 executing program 5: r0 = socket(0x10, 0x1, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:21:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xa00, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x3f00, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2945.351211][ T6015] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2945.395012][ T6015] device bond130 entered promiscuous mode [ 2945.426985][ T6052] bond130: (slave bridge163): making interface the new active one [ 2945.436305][ T6052] device bridge163 entered promiscuous mode [ 2945.445585][ T6052] bond130: (slave bridge163): Enslaving as an active interface with an up link [ 2945.479986][ T6015] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2945.495505][ T6052] bond130: (slave bridge164): Enslaving as a backup interface with an up link 01:21:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc", 0x9c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x1000000) 01:21:43 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', r3}) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = accept4(0xffffffffffffffff, &(0x7f0000000600)=@qipcrtr, &(0x7f0000000140)=0x80, 0x80800) ioctl$sock_qrtr_SIOCGIFADDR(r5, 0x8915, &(0x7f0000000300)={'bond0\x00', {0x2a, 0x3, 0xfffffffe}}) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:21:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x4000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x200000000000000, 0x21) [ 2948.011036][ T6068] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2948.049218][ T6068] device bond131 entered promiscuous mode [ 2948.095456][ T6070] tipc: Not found cipher: "gcm("! [ 2948.126406][ T6068] bond131: (slave bridge165): making interface the new active one [ 2948.134319][ T6068] device bridge165 entered promiscuous mode [ 2948.145763][ T6068] bond131: (slave bridge165): Enslaving as an active interface with an up link [ 2948.165021][ T6121] tipc: Not found cipher: "gcm("! [ 2948.188449][ T6068] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x80fe, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x1800000) 01:21:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xe00, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2948.236355][ T6131] bond131: (slave bridge166): Enslaving as a backup interface with an up link 01:21:44 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$CAPI_GET_MANUFACTURER(r5, 0xc0044306, &(0x7f0000000000)=0xfffffffa) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) [ 2948.337055][ T6145] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2948.372951][ T6145] device bond132 entered promiscuous mode [ 2948.420192][ T6143] tipc: Not found cipher: "gcm("! [ 2948.436668][ T6145] bond132: (slave bridge167): making interface the new active one 01:21:44 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) readlink(&(0x7f0000000000)='.\x00', &(0x7f0000000140), 0x0) 01:21:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xc0fe, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2948.461453][ T6145] device bridge167 entered promiscuous mode [ 2948.481531][ T6145] bond132: (slave bridge167): Enslaving as an active interface with an up link [ 2948.508718][ T6190] tipc: Not found cipher: "gcm("! [ 2948.546780][ T6145] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2948.580760][ T6196] bond132: (slave bridge168): Enslaving as a backup interface with an up link 01:21:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc", 0x9c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x2000000) 01:21:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x1200, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)=""/91, 0x5b}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/53, 0x3c}, {&(0x7f0000000280)=""/77, 0xfffffffffffffe60}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x40000ca, 0x6, &(0x7f0000003700)={0x77359400}) write$P9_RCLUNK(r2, &(0x7f0000000000)={0x7, 0x79, 0x2}, 0x7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x18, 0x3f9, 0x2, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x2400c8c0}, 0x8000) 01:21:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xfc00, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x8000000000000000, 0x21) 01:21:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@remote, @in6=@initdev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) dup(r5) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="000010a98047d2e68471a8c0a36224d167f4", @ANYRES32=0x0, @ANYBLOB="0000000000400000280012800b000100697036746e6c000018000280140002002001000000000000000000000000000008000a00", @ANYRES32=r8, @ANYBLOB="08001e0004000000"], 0x58}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000140)={'ip6tnl0\x00', r8, 0x2f, 0x0, 0x7f, 0x7, 0x1, @ipv4={[], [], @local}, @private1={0xfc, 0x1, [], 0x1}, 0x10, 0x40, 0x3}}) r9 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 2951.200326][ T6221] tipc: Not found cipher: "gcm("! [ 2951.205715][ T6220] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2951.239727][ T6220] device bond133 entered promiscuous mode [ 2951.255085][ T6233] bond133: (slave bridge169): making interface the new active one [ 2951.264251][ T6233] device bridge169 entered promiscuous mode [ 2951.270859][ T6233] bond133: (slave bridge169): Enslaving as an active interface with an up link [ 2951.280810][ T6239] tipc: Not found cipher: "gcm("! 01:21:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x3000000) 01:21:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xfe80, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2951.302368][ T6220] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) socket$bt_rfcomm(0x1f, 0x1, 0x3) [ 2951.378918][ T6233] bond133: (slave bridge170): Enslaving as a backup interface with an up link 01:21:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x2000, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2951.474349][ T6284] tipc: Not found cipher: "gcm("! [ 2951.489874][ T6298] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xfec0, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2951.523243][ T6298] device bond134 entered promiscuous mode [ 2951.560422][ T6302] tipc: Not found cipher: "gcm("! [ 2951.591581][ T6323] bond134: (slave bridge171): making interface the new active one [ 2951.640249][ T6323] device bridge171 entered promiscuous mode [ 2951.662750][ T6323] bond134: (slave bridge171): Enslaving as an active interface with an up link [ 2951.695421][ T6298] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2951.724112][ T6323] bond134: (slave bridge172): Enslaving as a backup interface with an up link 01:21:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc", 0x9c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x4000000) 01:21:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) sendmsg$NFNL_MSG_CTHELPER_NEW(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x74}, 0x1, 0x0, 0x0, 0x9800}, 0x44) r4 = dup(r1) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r7 = dup2(r6, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, r8}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000001080)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000140)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000600)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r8}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:21:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x2c02, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xff00, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xffffffff00000000, 0x21) [ 2954.174250][ T6356] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2954.227300][ T6356] device bond135 entered promiscuous mode [ 2954.284656][ T6363] tipc: Not found cipher: "gcm("! [ 2954.296738][ T6397] bond135: (slave bridge173): making interface the new active one [ 2954.313415][ T6397] device bridge173 entered promiscuous mode [ 2954.321290][ T6397] bond135: (slave bridge173): Enslaving as an active interface with an up link 01:21:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xff02, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2954.342848][ T6415] tipc: Not found cipher: "gcm("! [ 2954.356185][ T6356] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x5000000) [ 2954.403910][ T6397] bond135: (slave bridge174): Enslaving as a backup interface with an up link 01:21:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3c00, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) sendto(r5, &(0x7f0000000140)="302fdc35b2c9a129e1214f8514d025b792602b225b4c9ec7d66de5669e5639776c369f8f7af5c8a27bc3ed96382954d0fe02f83e3e60cc8d202a28896310b656a71f4808d7024736311dc4b3ed6fc9fe909ed89f260cdc4ce0ebadec2aea05e91f1ae3ddece330363b533aef004c863532ee359f2c57eda5a9df4e0d3ae741be13519e", 0x83, 0x40800, 0x0, 0x0) [ 2954.508682][ T6435] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2954.578247][ T6435] device bond136 entered promiscuous mode [ 2954.612284][ T6436] tipc: Not found cipher: "gcm("! 01:21:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x100000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2954.642595][ T6451] bond136: (slave bridge175): making interface the new active one [ 2954.655671][ T6451] device bridge175 entered promiscuous mode [ 2954.664825][ T6451] bond136: (slave bridge175): Enslaving as an active interface with an up link [ 2954.686539][ T6483] tipc: Not found cipher: "gcm("! [ 2954.703696][ T6435] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x6000000) [ 2954.745917][ T6451] bond136: (slave bridge176): Enslaving as a backup interface with an up link [ 2954.854626][ T6503] tipc: Not found cipher: "gcm("! [ 2954.908486][ T6509] tipc: Not found cipher: "gcm("! 01:21:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e737", 0xea}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3f00, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:53 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, 0x0, 0x1) getpeername$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x49c500, 0x0) getsockname$l2tp6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000000240)=0x20) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/119, 0x77}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000600)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r5, 0x100, 0x8, 0x25dfdbfd, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xffffbbf4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x800) 01:21:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x1000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x7000000) 01:21:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x9) 01:21:53 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) r2 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @remote}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={r4, @in={{0x2, 0x0, @empty}}, 0x3ff}, 0x90) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r4, 0xfffffffb}, &(0x7f0000000140)=0x8) r5 = socket(0x10, 0x2, 0x0) sendto(r5, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) lseek(r6, 0xacf, 0x0) recvmmsg(r5, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:21:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e737", 0xea}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 2957.350608][ T6531] tipc: Not found cipher: "gcm("! [ 2957.355748][ T6532] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2957.405945][ T6532] device bond137 entered promiscuous mode [ 2957.429603][ T6543] bond137: (slave bridge177): making interface the new active one [ 2957.438689][ T6543] device bridge177 entered promiscuous mode [ 2957.445498][ T6543] bond137: (slave bridge177): Enslaving as an active interface with an up link 01:21:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x2000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2957.457790][ T6547] tipc: Not found cipher: "gcm("! [ 2957.473467][ T6532] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x9000000) 01:21:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4000, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2957.557808][ T6543] bond137: (slave bridge178): Enslaving as a backup interface with an up link 01:21:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x3000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2957.650063][ T6612] tipc: Not found cipher: "gcm("! [ 2957.659567][ T6618] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2957.703341][ T6618] device bond138 entered promiscuous mode [ 2957.718586][ T6620] tipc: Not found cipher: "gcm("! [ 2957.733157][ T6623] bond138: (slave bridge179): making interface the new active one 01:21:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xf000000) [ 2957.759076][ T6623] device bridge179 entered promiscuous mode [ 2957.766057][ T6623] bond138: (slave bridge179): Enslaving as an active interface with an up link [ 2957.783774][ T6618] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4088, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2957.818678][ T6623] bond138: (slave bridge180): Enslaving as a backup interface with an up link 01:21:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x4000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2957.897676][ T6668] tipc: Not found cipher: "gcm("! [ 2957.902833][ T6675] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2957.945389][ T6675] device bond139 entered promiscuous mode [ 2957.970468][ T6677] bond139: (slave bridge181): making interface the new active one [ 2957.979704][ T6677] device bridge181 entered promiscuous mode 01:21:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x28000000) [ 2957.988958][ T6677] bond139: (slave bridge181): Enslaving as an active interface with an up link [ 2957.999336][ T6678] tipc: Not found cipher: "gcm("! [ 2958.016439][ T6675] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4800, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2958.144407][ T6733] device bond140 entered promiscuous mode [ 2958.191679][ T6731] tipc: Not found cipher: "gcm("! [ 2958.205168][ T6733] bond140: (slave bridge183): making interface the new active one [ 2958.215428][ T6733] device bridge183 entered promiscuous mode [ 2958.223800][ T6733] bond140: (slave bridge183): Enslaving as an active interface with an up link [ 2958.248657][ T6771] tipc: Not found cipher: "gcm("! [ 2958.322605][ T6775] bond140: (slave bridge184): Enslaving as a backup interface with an up link 01:21:56 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000040)={0xf000000, 0xffffff37, 0x2, r1, 0x0, &(0x7f0000000000)={0x98090b, 0x8001, [], @ptr=0x6}}) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f0000000100)={0x40, "fc6f01cd9c74965bc3189310c1e8bb5c9b4e4b65fb8460f3efbb80ac7ed9c03e", 0x2, 0x20, 0xfd, 0x6, 0x8, 0x1, 0x40, 0x5}) ptrace$cont(0x18, r0, 0xa5, 0x4000000000000000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x5000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2960.279793][ T6789] ptrace attach of "/root/syz-executor.0"[6788] was attempted by "/root/syz-executor.0"[6789] 01:21:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e737", 0xea}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x2d000000) 01:21:56 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) r6 = dup(r5) ioctl$BLKZEROOUT(r6, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) r8 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB=':\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="040027bd700000000000020000000c00060002000000000000000c00020002000000000000000c00020004000000000000"], 0x38}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)={0x44, r8, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x10000}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x8080) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000240)=""/76, 0x4c}, {&(0x7f0000000140)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x0, 0x989680}) 01:21:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4a00, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x6000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2960.441769][ T6798] tipc: Not found cipher: "gcm("! 01:21:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x3f000000) [ 2960.484220][ T6805] tipc: Not found cipher: "gcm("! [ 2960.489866][ T6803] validate_nla: 2 callbacks suppressed [ 2960.489875][ T6803] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2960.580539][ T6803] device bond141 entered promiscuous mode [ 2960.595419][ T6823] bond141: (slave bridge185): making interface the new active one [ 2960.618391][ T6823] device bridge185 entered promiscuous mode [ 2960.629118][ T6823] bond141: (slave bridge185): Enslaving as an active interface with an up link [ 2960.662423][ T6851] tipc: Not found cipher: "gcm("! [ 2960.668686][ T6803] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:56 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0xc841, 0x0, 0x0) r1 = socket$inet6(0xa, 0x4, 0x7) getsockopt(r1, 0x4418, 0x3, &(0x7f0000000140)=""/109, &(0x7f0000000000)=0x6d) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$FBIOPUT_CON2FBMAP(r4, 0x4610, &(0x7f0000000240)={0x29, 0x1}) [ 2960.685588][ T6823] bond141: (slave bridge186): Enslaving as a backup interface with an up link 01:21:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x7000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2960.743885][ T6886] tipc: Not found cipher: "gcm("! 01:21:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4c00, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x40000000) [ 2960.851469][ T6901] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2960.914443][ T6901] device bond142 entered promiscuous mode 01:21:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x8000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2960.971555][ T6903] tipc: Not found cipher: "gcm("! [ 2960.984460][ T6913] bond142: (slave bridge187): making interface the new active one [ 2960.992668][ T6913] device bridge187 entered promiscuous mode [ 2961.024063][ T6913] bond142: (slave bridge187): Enslaving as an active interface with an up link [ 2961.033930][ T6945] tipc: Not found cipher: "gcm("! [ 2961.045124][ T6901] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2961.085097][ T6913] bond142: (slave bridge188): Enslaving as a backup interface with an up link 01:21:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x111}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x501a0000) 01:21:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x5865, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:21:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x9000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:21:59 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x5194c0, 0x12) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000080)) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x10000, &(0x7f0000003700)) 01:21:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) dup(r1) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:21:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x111}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 2963.550076][ T6975] tipc: Not found cipher: "gcm("! [ 2963.555185][ T6976] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x111}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 2963.613953][ T6976] device bond143 entered promiscuous mode [ 2963.644982][ T6994] bond143: (slave bridge189): making interface the new active one [ 2963.655465][ T6994] device bridge189 entered promiscuous mode 01:21:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xa000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2963.675554][ T6994] bond143: (slave bridge189): Enslaving as an active interface with an up link [ 2963.686008][ T6992] tipc: Not found cipher: "gcm("! [ 2963.707107][ T6976] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:59 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000240)=""/85, 0x55}, {&(0x7f0000000600)=""/4100, 0x1004}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/50, 0x32}, {&(0x7f0000000140)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) 01:21:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x5f000000) 01:21:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x5c00, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2963.771207][ T6994] bond143: (slave bridge190): Enslaving as a backup interface with an up link 01:21:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xc000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2963.898848][ T7059] tipc: Not found cipher: "gcm("! [ 2963.904136][ T7063] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:21:59 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) recvmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/41, 0x29}], 0x1, &(0x7f0000000600)=""/207, 0xcf}, 0x40007223) [ 2963.953393][ T7063] device bond144 entered promiscuous mode [ 2963.984379][ T7068] bond144: (slave bridge191): making interface the new active one [ 2963.995649][ T7068] device bridge191 entered promiscuous mode 01:21:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x9effffff) [ 2964.020297][ T7068] bond144: (slave bridge191): Enslaving as an active interface with an up link [ 2964.032550][ T7069] tipc: Not found cipher: "gcm("! 01:22:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x10000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6000, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2964.088626][ T7068] bond144: (slave bridge192): Enslaving as a backup interface with an up link [ 2964.106773][ T7063] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2964.195769][ T7129] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2964.261640][ T7129] device bond145 entered promiscuous mode [ 2964.300681][ T7136] bond145: (slave bridge193): making interface the new active one [ 2964.309188][ T7136] device bridge193 entered promiscuous mode [ 2964.315513][ T7136] bond145: (slave bridge193): Enslaving as an active interface with an up link [ 2964.331865][ T7136] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2964.363162][ T7136] device bond146 entered promiscuous mode 01:22:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xf0ffffff) 01:22:02 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000000)={0x6, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x124}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x12000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6558, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x1, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @empty}}, 0x3ff}, 0x90) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={0x0, 0x9}, 0x8) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000080)=0x8) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:02 executing program 5: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x20, 0x3fa, 0x800, 0x70bd2d, 0x25dfdbff, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4040890}, 0x4004811) sendto(0xffffffffffffffff, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f0000000600)=[{{r2, r3/1000+10000}, 0x0, 0x8, 0x2}, {{}, 0x4, 0x8001, 0x7}, {{}, 0x0, 0x8, 0x3}, {{0x77359400}, 0x1, 0x3, 0xffffffe1}, {{0x77359400}, 0x11, 0xff, 0x80}], 0x78) recvmmsg(r0, &(0x7f0000000000)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/115, 0x73}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x40000045, &(0x7f0000000140)={0x77359400}) 01:22:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xfffff000) [ 2966.730264][ T7231] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xffffff7f) [ 2966.770596][ T7231] device bond147 entered promiscuous mode [ 2966.805610][ T7273] bond147: (slave bridge195): making interface the new active one [ 2966.814598][ T7273] device bridge195 entered promiscuous mode 01:22:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xffffff9e) 01:22:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x3f000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2966.821663][ T7273] bond147: (slave bridge195): Enslaving as an active interface with an up link [ 2966.855132][ T7231] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:02 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x200000) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) dup(r5) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000140)={0x8, 0x8, 0x5, 0x1f, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000600)={r6, @in6={{0xa, 0x4e21, 0x80, @empty, 0x6}}}, 0x84) [ 2966.904340][ T7273] bond147: (slave bridge196): Enslaving as a backup interface with an up link 01:22:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xfffffff0) 01:22:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6800, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2967.034340][ T7307] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2967.083142][ T7307] device bond148 entered promiscuous mode [ 2967.101324][ T7341] bond148: (slave bridge197): making interface the new active one [ 2967.111951][ T7341] device bridge197 entered promiscuous mode [ 2967.119826][ T7341] bond148: (slave bridge197): Enslaving as an active interface with an up link [ 2967.132677][ T7307] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2967.173157][ T7341] bond148: (slave bridge198): Enslaving as a backup interface with an up link 01:22:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x124}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x2000000000000) 01:22:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x40000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:05 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) r6 = dup(r5) ioctl$BLKZEROOUT(r6, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) bind$pptp(r6, &(0x7f0000000140)={0x18, 0x2, {0x1, @local}}, 0x1e) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000000)={0x5, 0x29, 0x1, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000001040)=""/4107, 0x100b}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6c00, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x161802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$PPPIOCSMRRU(r3, 0x4004743b, &(0x7f0000000000)=0x7fff) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x23) [ 2969.842373][ T7356] tipc: Not found cipher: "gcm("! [ 2969.847835][ T7358] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2969.887890][ T7358] device bond149 entered promiscuous mode [ 2969.909572][ T7372] bond149: (slave bridge199): making interface the new active one [ 2969.918920][ T7372] device bridge199 entered promiscuous mode 01:22:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xc3ffffff, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2969.951480][ T7372] bond149: (slave bridge199): Enslaving as an active interface with an up link [ 2969.967638][ T7375] tipc: Not found cipher: "gcm("! 01:22:05 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) fallocate(r5, 0x0, 0x800, 0x9) sendmsg$inet(r5, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000600)="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", 0xff}, {&(0x7f0000000700)="3036005ddf91192545b0176d57116cc351924053c3e3d3fc90546180e684e8ba1fea67a290402527854202934efc646a27a32812c7f9ae124e0ad0e9709da6bdae161cbf524b203b3b5eecb49d9a3f6c0c8319849e02596a81cb8d190855d0e659f36de2695514cc1e12cb9b45db6ee6673f216298a1938406f1332597adaec2db6e67ba3eb6cb6f9f4d1423c41de27d14c651d53947eced94c8e7201cafa6dce8aa3586cfc7630f49f72170f502adfc14cc23e1c63f99ffb61fa18dff3b459648069a709d22b4b6d5abdf3ab58285ca63461b12a51bc86a4495fba5", 0xdc}, {&(0x7f0000000800)="ec2db3695e9aa5b3650ef59d5f8e91754efd9055834b51203df5ad851b773ca7f4251235476284a21a6d03af7d1155e2f7dd0c20f07a70f2d1a19969053670bdb9c32eb9ce9e04b9850f9ec88ddc5a694132e54ebf95c840a966244baecfb3919e67d136841d7de87e0f9d0bec6fa6c53e71a339dfa66b80491c6a1edcb3dbf8ec8c3804adbef6ec0855633068e8b2970b3c76f4dcddda9a10231345a9b70c1f6e6cdd76eb7888feae33af99415a2ed1214c15576162d9e2fc4170af22646e006b8636f358c2714665c729084a6c926d75d9ccd62b1a", 0xd6}], 0x3}, 0x18940) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 2969.993415][ T7358] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x3000000000000) 01:22:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6c02, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2970.052421][ T7372] bond149: (slave bridge200): Enslaving as a backup interface with an up link 01:22:06 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xf5ffffff, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2970.182632][ T7438] tipc: Not found cipher: "gcm("! [ 2970.191046][ T7439] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2970.254126][ T7439] device bond150 entered promiscuous mode [ 2970.265880][ T7446] tipc: Not found cipher: "gcm("! [ 2970.289651][ T7445] bond150: (slave bridge201): making interface the new active one [ 2970.312460][ T7445] device bridge201 entered promiscuous mode [ 2970.319743][ T7445] bond150: (slave bridge201): Enslaving as an active interface with an up link [ 2970.357194][ T7439] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2970.383247][ T7439] bond150: (slave bridge202): Enslaving as a backup interface with an up link 01:22:08 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000140)={[{0x1, 0x9be, 0x1f, 0x20, 0x40, 0x6, 0x4, 0x2, 0x40, 0x8, 0x6, 0x1}, {0x8, 0x400, 0x0, 0x40, 0x3, 0x81, 0xd2, 0x9, 0x2, 0x4, 0x40, 0x9, 0x4fc}, {0xb2f2, 0x81, 0x3, 0x0, 0x1, 0x2, 0x6, 0xa4, 0xfb, 0x5, 0x0, 0x1, 0x2}], 0x3}) r4 = dup(r1) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7fff, 0x1) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r5, &(0x7f0000000600)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x30, 0x2, 0x8, 0x101, 0x0, 0x0, {0x1, 0x0, 0x7}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x892f}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004001}, 0x8008086) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x40030000000000) 01:22:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6c03, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xfc000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xf, r0, 0x4, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) r1 = dup(0xffffffffffffffff) r2 = dup(r1) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r3 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @empty}}, 0x3ff, 0x3}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={r4, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0xfffffff9}}, 0x2c, 0x4, 0xef, 0x1, 0x2, 0x7}, 0x9c) 01:22:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x124}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 2972.848507][ T7514] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2972.904182][ T7514] device bond151 entered promiscuous mode [ 2972.943234][ T7524] tipc: Not found cipher: "gcm("! [ 2972.961871][ T7554] bond151: (slave bridge203): making interface the new active one [ 2972.971872][ T7554] device bridge203 entered promiscuous mode [ 2972.980844][ T7554] bond151: (slave bridge203): Enslaving as an active interface with an up link [ 2973.008914][ T7578] tipc: Not found cipher: "gcm("! [ 2973.014766][ T7514] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xf0ffffffffffff) [ 2973.053415][ T7554] bond151: (slave bridge204): Enslaving as a backup interface with an up link 01:22:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xfe800000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x7400, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:09 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) r6 = dup(r5) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/nvme-fabrics\x00', 0x400000, 0x0) getsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000540)={@local, @private}, &(0x7f0000000580)=0x8) ioctl$BLKZEROOUT(r6, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400202) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r8 = dup(r7) dup(r8) shutdown(r8, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f0000000840)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000b40), 0x7, &(0x7f0000002400)=""/191, 0xbf}}, {{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000008c0)=""/138, 0x8a}, {&(0x7f0000000980)=""/145, 0x91}, {&(0x7f0000000080)=""/56, 0x2e}], 0x11ad}, 0x6}], 0xfffffffffffffe8c, 0x6, &(0x7f0000000300)={0x77359400}) [ 2973.142497][ T7590] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2973.181002][ T7590] device bond152 entered promiscuous mode 01:22:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x100000000000000) [ 2973.201164][ T7590] bond152: (slave bridge205): making interface the new active one [ 2973.209130][ T7590] device bridge205 entered promiscuous mode [ 2973.216457][ T7590] bond152: (slave bridge205): Enslaving as an active interface with an up link 01:22:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x7a00, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2973.246754][ T7590] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2973.277984][ T7632] bond152: (slave bridge206): Enslaving as a backup interface with an up link [ 2973.349890][ T7638] tipc: Not found cipher: "gcm("! 01:22:09 executing program 5: r0 = socket(0x1e, 0x2, 0x5) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xfec00000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x180000000000000) [ 2973.413211][ T7651] tipc: Not found cipher: "gcm("! [ 2973.431875][ T7648] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2973.503691][ T7648] device bond153 entered promiscuous mode [ 2973.522328][ T7653] bond153: (slave bridge207): making interface the new active one [ 2973.540914][ T7653] device bridge207 entered promiscuous mode 01:22:09 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) io_setup(0x0, &(0x7f0000000000)=0x0) io_getevents(r3, 0xffff, 0x5, &(0x7f0000000140)=[{}, {}, {}, {}, {}], &(0x7f0000000200)={0x77359400}) [ 2973.549516][ T7653] bond153: (slave bridge207): Enslaving as an active interface with an up link [ 2973.615012][ T7682] tipc: Not found cipher: "gcm("! [ 2973.620394][ T7648] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2973.639572][ T7653] bond153: (slave bridge208): Enslaving as a backup interface with an up link [ 2973.677287][ T7710] tipc: Not found cipher: "gcm("! 01:22:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x827449c5231e8ea7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, &(0x7f0000000000)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x12e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xff000000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x7e03, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x200000000000000) 01:22:11 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'bond0\x00', @ifru_settings={0xfffffff9, 0x7ff, @fr_pvc_info=&(0x7f0000000000)={0xffffff01, 'veth0_to_batadv\x00'}}}}) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sync_file_range(r1, 0x4, 0x4, 0x1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) getsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], &(0x7f0000000040)=0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 2975.956922][ T7730] tipc: Not found cipher: "gcm("! [ 2975.970024][ T7726] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2976.027823][ T7726] device bond154 entered promiscuous mode [ 2976.040933][ T7740] bond154: (slave bridge209): making interface the new active one [ 2976.059901][ T7740] device bridge209 entered promiscuous mode 01:22:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xff020000, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x300000000000000) [ 2976.071747][ T7740] bond154: (slave bridge209): Enslaving as an active interface with an up link [ 2976.093458][ T7735] tipc: Not found cipher: "gcm("! [ 2976.110115][ T7726] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x8100, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2976.166389][ T7740] bond154: (slave bridge210): Enslaving as a backup interface with an up link [ 2976.251454][ T7807] tipc: Not found cipher: "gcm("! [ 2976.296366][ T7815] tipc: Not found cipher: "gcm("! [ 2976.301839][ T7816] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x400000000000000) [ 2976.338081][ T7816] device bond155 entered promiscuous mode [ 2976.364230][ T7824] bond155: (slave bridge211): making interface the new active one [ 2976.373025][ T7824] device bridge211 entered promiscuous mode 01:22:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xffffffc3, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xa400, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2976.381208][ T7824] bond155: (slave bridge211): Enslaving as an active interface with an up link [ 2976.401545][ T7816] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2976.421060][ T7824] bond155: (slave bridge212): Enslaving as a backup interface with an up link [ 2976.510441][ T7866] tipc: Not found cipher: "gcm("! [ 2976.542613][ T7874] device bond156 entered promiscuous mode [ 2976.564533][ T7877] tipc: Not found cipher: "gcm("! [ 2976.594510][ T7910] bond156: (slave bridge213): making interface the new active one [ 2976.620470][ T7910] device bridge213 entered promiscuous mode [ 2976.629234][ T7910] bond156: (slave bridge213): Enslaving as an active interface with an up link [ 2976.650245][ T7910] bond156: (slave bridge214): Enslaving as a backup interface with an up link 01:22:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f", 0x12e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:14 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x5c, r2, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r2, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x80000001}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x886c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x177}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000000}, 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x500000000000000) 01:22:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xaa01, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0xfffffff5, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) ptrace$cont(0x20, r1, 0x7, 0xa46) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x2000000003, 0x10000000000021) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xc0000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000040)={0x1, 0x0, [{0x6, 0x4, 0x0, 0x0, @adapter={0xdb2, 0x3, 0x4, 0x7e8, 0x6}}]}) [ 2979.079000][ T7927] tipc: Not found cipher: "gcm("! [ 2979.091679][ T7928] validate_nla: 2 callbacks suppressed [ 2979.091689][ T7928] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2979.140944][ T7928] device bond157 entered promiscuous mode [ 2979.155310][ T7939] bond157: (slave bridge215): making interface the new active one [ 2979.164925][ T7939] device bridge215 entered promiscuous mode 01:22:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0x0, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2979.190921][ T7939] bond157: (slave bridge215): Enslaving as an active interface with an up link [ 2979.206526][ T7949] tipc: Not found cipher: "gcm("! 01:22:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x600000000000000) 01:22:15 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9f) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 2979.246069][ T7928] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xb401, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2979.304880][ T7939] bond157: (slave bridge216): Enslaving as a backup interface with an up link [ 2979.395116][ T7999] tipc: Not found cipher: "gcm("! [ 2979.401171][ T8007] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2979.435005][ T8007] device bond158 entered promiscuous mode [ 2979.457061][ T8011] tipc: Not found cipher: "gcm("! [ 2979.469284][ T8051] bond158: (slave bridge217): making interface the new active one [ 2979.494834][ T8051] device bridge217 entered promiscuous mode 01:22:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x700000000000000) 01:22:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x3}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2979.507214][ T8051] bond158: (slave bridge217): Enslaving as an active interface with an up link [ 2979.526195][ T8007] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2979.563825][ T8051] bond158: (slave bridge218): Enslaving as a backup interface with an up link [ 2979.633281][ T8058] tipc: Not found cipher: "gcm("! [ 2979.674472][ T8068] tipc: Not found cipher: "gcm("! 01:22:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x12e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xbe01, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x900000000000000) 01:22:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x4}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:17 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) ioctl$SOUND_MIXER_READ_RECSRC(r3, 0x80044dff, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000200)={r5, @in={{0x2, 0x0, @empty}}, 0x3ff}, 0x90) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r5, 0xffff, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 2982.021066][ T8080] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2982.061704][ T8080] device bond159 entered promiscuous mode [ 2982.123810][ T8087] tipc: Not found cipher: "gcm("! 01:22:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f00000016c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) process_vm_writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/1, 0x1}, {&(0x7f0000000140)=""/99, 0x63}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/170, 0xaa}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/147, 0x93}, {&(0x7f00000015c0)=""/243, 0xf3}], 0x6, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+'}, 0x16, 0x2) [ 2982.147634][ T8118] bond159: (slave bridge219): making interface the new active one [ 2982.158201][ T8118] device bridge219 entered promiscuous mode [ 2982.172071][ T8118] bond159: (slave bridge219): Enslaving as an active interface with an up link [ 2982.193956][ T8136] tipc: Not found cipher: "gcm("! 01:22:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xf00000000000000) [ 2982.224573][ T8080] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2982.261497][ T8118] bond159: (slave bridge220): Enslaving as a backup interface with an up link 01:22:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xe203, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2982.353771][ T8154] tipc: Not found cipher: "gcm("! [ 2982.359914][ T8163] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2982.401846][ T8163] device bond160 entered promiscuous mode [ 2982.420099][ T8165] tipc: Not found cipher: "gcm("! 01:22:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x6}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x2800000000000000) [ 2982.449114][ T8192] bond160: (slave bridge221): making interface the new active one [ 2982.457895][ T8192] device bridge221 entered promiscuous mode [ 2982.464696][ T8192] bond160: (slave bridge221): Enslaving as an active interface with an up link [ 2982.478521][ T8163] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xea03, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2982.511725][ T8192] bond160: (slave bridge222): Enslaving as a backup interface with an up link [ 2982.593141][ T8216] tipc: Not found cipher: "gcm("! [ 2982.598725][ T8222] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2982.648526][ T8222] device bond161 entered promiscuous mode [ 2982.661427][ T8226] tipc: Not found cipher: "gcm("! [ 2982.683775][ T8229] bond161: (slave bridge223): making interface the new active one [ 2982.728778][ T8229] device bridge223 entered promiscuous mode [ 2982.736582][ T8229] bond161: (slave bridge223): Enslaving as an active interface with an up link [ 2982.760954][ T8229] bond161: (slave bridge224): Enslaving as a backup interface with an up link [ 2982.770575][ T8222] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x133}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x2d00000000000000) 01:22:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xee00, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:21 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000000)=0x6) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) ioctl$KVM_SET_NR_MMU_PAGES(r5, 0xae44, 0x6) [ 2985.130845][ T8287] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000000)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 2985.211618][ T8287] device bond162 entered promiscuous mode 01:22:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() dup(0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000003c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, r2, 0x1, 0x0, 0x0, {0x5}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}]}, 0x44}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x100, 0x70bd2a, 0x25dfdbfc}, 0xfffffffffffffd40}}, 0x8800) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x19}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0xff}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000000)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="4ae493a5560c955e") ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x8}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2985.313484][ T8290] tipc: Not found cipher: "gcm("! [ 2985.366734][ T8315] bond162: (slave bridge225): making interface the new active one [ 2985.376198][ T8315] device bridge225 entered promiscuous mode [ 2985.384415][ T8315] bond162: (slave bridge225): Enslaving as an active interface with an up link [ 2985.405160][ T8356] tipc: Not found cipher: "gcm("! 01:22:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000000)={0x2}) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x3f00000000000000) [ 2985.422614][ T8287] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:21 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) getsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000140)=0x8) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) dup(r6) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r8 = dup(r7) r9 = dup(r8) ioctl$BLKZEROOUT(r9, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r9, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="180000006f2ec4dc89dfb6e4a5ffa8f81d06080008010002000000efe048666fefe149c67f31b7ce76d96b566ceb719b573dd1c8632b31b6c93e82d15b64c0685f938be6abcc994bea5e1b07e88ace60749d702eb3e8dc94d8cd24461f0e7ad10f1959a81a79804804387da4348c7ff2ff56d467599afc533487e9993528b65254ee7909328fc7bf5e33ef1466355212cfe8288f6bb588af247b5fadcae8f68570b2bfc785948afa0c24f0d78c3189c5358477ca8abd13e45c5f0603006ab7e4086ea8e735914155d741b7acba9116bc073bcfb395ee87279c5db5c438b67b984a1e"], 0x18}, 0x1, 0x0, 0x0, 0x42}, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f0000000180), &(0x7f00000001c0)=0x4) [ 2985.493360][ T8315] bond162: (slave bridge226): Enslaving as a backup interface with an up link 01:22:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xee03, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2985.592109][ T8381] tipc: Not found cipher: "gcm("! [ 2985.652714][ T8390] tipc: Not found cipher: "gcm("! [ 2985.660952][ T8397] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2985.690969][ T8397] device bond163 entered promiscuous mode [ 2985.717885][ T8397] bond163: (slave bridge227): making interface the new active one [ 2985.734061][ T8397] device bridge227 entered promiscuous mode [ 2985.743181][ T8397] bond163: (slave bridge227): Enslaving as an active interface with an up link [ 2985.769848][ T8433] bond163: (slave bridge228): Enslaving as a backup interface with an up link [ 2985.778891][ T8397] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x133}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x9}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x4000000000000000) 01:22:24 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SNDCTL_DSP_GETOPTR(0xffffffffffffffff, 0x800c5012, &(0x7f0000000000)) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xf000, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2988.191847][ T8443] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2988.234320][ T8443] device bond164 entered promiscuous mode [ 2988.274188][ T8444] tipc: Not found cipher: "gcm("! [ 2988.303595][ T8491] bond164: (slave bridge229): making interface the new active one [ 2988.321321][ T8491] device bridge229 entered promiscuous mode [ 2988.329003][ T8491] bond164: (slave bridge229): Enslaving as an active interface with an up link [ 2988.342214][ T8443] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2988.352693][ T8501] tipc: Not found cipher: "gcm("! [ 2988.373943][ T8491] bond164: (slave bridge230): Enslaving as a backup interface with an up link 01:22:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0xa}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x501a000000000000) 01:22:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xf403, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x14080, 0x0) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0xc, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x20000002) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) ioctl$CHAR_RAW_ROSET(r3, 0x125d, &(0x7f00000001c0)=0x8000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r4 = dup(0xffffffffffffffff) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$UI_END_FF_ERASE(r5, 0x400c55cb, &(0x7f0000000200)={0xf, 0x5, 0xf949}) ptrace$cont(0x20, r0, 0x0, 0x21) [ 2988.617417][ T8514] tipc: Not found cipher: "gcm("! [ 2988.622542][ T8520] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0xb}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2988.763658][ T8520] device bond165 entered promiscuous mode [ 2988.812716][ T8522] bond165: (slave bridge231): making interface the new active one [ 2988.853772][ T8522] device bridge231 entered promiscuous mode [ 2988.873571][ T8522] bond165: (slave bridge231): Enslaving as an active interface with an up link [ 2988.884146][ T8528] tipc: Not found cipher: "gcm("! [ 2988.911538][ T8520] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x5f00000000000000) [ 2988.969842][ T8522] bond165: (slave bridge232): Enslaving as a backup interface with an up link 01:22:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2989.165735][ T8587] tipc: Not found cipher: "gcm("! [ 2989.219430][ T8595] tipc: Not found cipher: "gcm("! 01:22:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x133}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xf600, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x9effffff00000000) 01:22:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x2]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:27 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="b2c8904f8a17c9f81cf3a32f1acf72d05aca9ba9b80e54b5272bb79db404a2403ea461ef9f82879fc12ed057e8e26df25c942ee7d1833c20a58311f03351c7ac644fb373436aaa0a0b69c16fff87a2dbab706e2b18fde297704b2616c6d3ce91be9f76ebfdf5b9779de945905c76a162d28f185b1bcb6653db9e52d2def72bbfccfce4619646712f832484d9d2d611ff5ec3f8aea22ead45797ea9ca5b6364b10f0466f82e7dad63e3a14f99dfdb84cb2b53755e910d29f9c543d624ec94cb8b", 0xc0}], 0x1, 0x4) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) dup(r5) ioctl$DRM_IOCTL_SET_SAREA_CTX(r5, 0x4010641c, &(0x7f0000000240)={0x0, &(0x7f0000000600)=""/231}) [ 2991.293925][ T8608] tipc: Not found cipher: "gcm("! [ 2991.300182][ T8611] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2991.343897][ T8611] device bond166 entered promiscuous mode [ 2991.355981][ T8619] tipc: Not found cipher: "gcm("! [ 2991.383220][ T8621] bond166: (slave bridge233): making interface the new active one 01:22:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xf0ffffff00000000) 01:22:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x3]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2991.414056][ T8621] device bridge233 entered promiscuous mode [ 2991.436727][ T8621] bond166: (slave bridge233): Enslaving as an active interface with an up link [ 2991.455995][ T8621] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:27 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket$inet(0x2, 0x4, 0x6) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000600)={0x0, 0xd6, "f1754f8ccd61fcec4e7c4211a8ec76c0bb49d63ae0c5863239ad92fa088d29b209878733e16a039681b28cf77a9fb169d6973e6e65648c5338fa91d588bde77f694f36a69fcfe03ceb1131aa4cc26419c1a445a20a10ff0e8961ad540b52574c335fb8cbb2d8d0520fd74ef3aaf8e2192f090e72e4d07cca30a4c4ab0b24fe2fb507a6c5cc2cd86d5916f1b89c713ccf06e83b4b46859875f06301732e16fe52c383d47afd16c1f800dde30b2dbaad348dd1311fa56b49837830d107376ffecdbfd27db69f38f71f161a2e45abfbbdd9eea72f32c845"}, &(0x7f0000000000)=0xde) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) r6 = dup(r5) ioctl$BLKZEROOUT(r6, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000140)="2355ca0a37281d361c594f8ba887d7437251a75b257282ca6ddd2118fb43bb022a6bd763cbb811c5fe1fa18a0700a39cb5eccc76cde897284710b93b9d8569fd98cc95e87f0c573dc3d67286028fa9fbe918c337f5fd37dcc971d4914c5c704bc48a1095b89203d17a798934cdd6883553bf2a505037b89f4e189a9168ce4f723ef507a7f2eb621a56d7413027187839f372", 0x92}, {&(0x7f0000000700)="71e4e5475840082ec7f8ef4cbf2bf010cc23b83acd1fd9b1624c1c0c48554eaec5dd599dbe790b13595bf2fdd33eb2492945a66a90a8988525e08f9acde7cd29ade3163ee9e0d3ce36ca0d1fa6acf562e7244724499d49b0d5ca3ee33d31c3e76b1d4bd070fa7f5329846eb7eee801b75ac8a78935d19582f4ef23432b648f570c0665aff0a7765afbada7bc4f9d776e96fd982576248f657a1ff947e8ff1b050f33b3778fac6ed821c80310ee59c20d247303269e6325dedf856dab84a731d867df87c9ef450d54099b77b42b0e01a3c22cbceb1a0d2b1552593977b5736ab65721458af037f8c2fcfd0afc3d3ba52b", 0xf0}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="5e8883272020cc11d11711e1d7640c364c18f093677921d7699f428dfc2a56b223333637c1eb487550ac2e3047d0d4d4b9b213a016a6476a8a072674216e88bfc7ae819185b9c0297639ded5ac5081f462418a9a07efd8112d1f70d44aa7c6c4c2e8261642cdbd83c0791d8829b6945c454e029a4a0aa6ae14d3ae911754cb890bcee25a06f85536dddd06d6a982cf8a2892feefb87ff298c86a2d9c7223f3bf96777b30e40e3d9c", 0xa8}, {&(0x7f00000018c0)="bd569e52544a555ceda505f140387fb841d774f57c306e046b540bd1df17b942b06516c0b0b64ab42ec540bbdf88d20515b6ef1f5da9c9d2312072ee588680711d7bdaa07a835581d2870f24c9500375ffde78a85c395ce9968135e7f2b5ce6adcf6dc1b447b3326c591a366fa19401dca8af2f416909d2feb7398d04e18eccb94a78a47501dd2f6f4328df0bc00e1df1fd1a9803e13ad881e3b3b7fed833996a422609b39d2ae210caac1f0585ffb32fc0ef6ebbcdea77808b13d35b1f287da696063c5969d6a8ad170af2c73bbafd59a07a79b8a202fc4d87058fc3ee80b6c719e680d2a629e5bdc72cb029f5da681dbb85e8f", 0xf4}], 0x5}, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setstatus(r3, 0x4, 0x2000) r7 = syz_usb_connect(0x2, 0x1b, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x5, 0xa2, 0x4e, 0x20, 0x1b80, 0xe395, 0x7c3, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x9, 0x0, 0xfd, 0x0, 0x0, 0x1}}]}}, 0x0) syz_usb_control_io(r7, 0x0, 0x0) syz_usb_control_io$uac1(r7, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r7, 0x0, 0x0) syz_usb_disconnect(r7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006, 0xfd}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/81, 0x51}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x46, &(0x7f0000003700)={0x77359400}) [ 2991.503840][ T8669] bond166: (slave bridge234): Enslaving as a backup interface with an up link [ 2991.609598][ T8672] tipc: Not found cipher: "gcm("! [ 2991.657762][ T8687] tipc: Not found cipher: "gcm("! 01:22:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000005, 0x1010, r1, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xf603, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x4]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xffffff7f00000000) [ 2991.744632][ T8698] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2991.782792][ T8698] device bond167 entered promiscuous mode [ 2991.826311][ T8700] tipc: Not found cipher: "gcm("! [ 2991.845640][ T8740] bond167: (slave bridge235): making interface the new active one [ 2991.853490][ T8740] device bridge235 entered promiscuous mode [ 2991.861516][ T8740] bond167: (slave bridge235): Enslaving as an active interface with an up link [ 2991.882673][ T8749] tipc: Not found cipher: "gcm("! [ 2991.888325][ T8698] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2991.936217][ T8740] bond167: (slave bridge236): Enslaving as a backup interface with an up link [ 2991.945328][ T2518] usb 6-1: new full-speed USB device number 19 using dummy_hcd [ 2992.305490][ T2518] usb 6-1: config 253 has no interfaces? [ 2992.311181][ T2518] usb 6-1: New USB device found, idVendor=1b80, idProduct=e395, bcdDevice= 7.c3 [ 2992.320744][ T2518] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 01:22:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x5]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xffffffff00000000) 01:22:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xfa03, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2994.331061][ T8766] tipc: Not found cipher: "gcm("! [ 2994.336715][ T8767] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0xfffffffffffff000) [ 2994.409525][ T8767] device bond168 entered promiscuous mode [ 2994.425172][ T8773] tipc: Not found cipher: "gcm("! 01:22:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x6]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2994.465561][ T8785] bond168: (slave bridge237): making interface the new active one [ 2994.504498][ T8785] device bridge237 entered promiscuous mode [ 2994.527016][ T8785] bond168: (slave bridge237): Enslaving as an active interface with an up link [ 2994.540740][ T8767] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2994.562388][ T8785] bond168: (slave bridge238): Enslaving as a backup interface with an up link 01:22:30 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) dup2(r3, r0) 01:22:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xfe03, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017003c00040067636d28000000000000"], 0x54}}, 0x0) 01:22:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x7, 0x5, 0x7fff, 0x1ff, 'syz1\x00', 0x401}, 0x2, 0x3, 0xfef3, r4, 0x6, 0x10001, 'syz1\x00', &(0x7f0000000080)=['^\x00', '\x00', 'd\'-\x00', '::\\\x00', '}.)\x00', '\x8c))\x00'], 0x13, [], [0x9, 0x4, 0x101]}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 2994.824621][ T3081] usb 6-1: USB disconnect, device number 19 [ 2994.883731][ T8846] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2994.908355][ T8849] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2994.966641][ T8849] device bond169 entered promiscuous mode [ 2994.988578][ T8899] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2995.001814][ T8891] bond169: (slave bridge239): making interface the new active one 01:22:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x8]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2995.026240][ T8891] device bridge239 entered promiscuous mode [ 2995.032920][ T8891] bond169: (slave bridge239): Enslaving as an active interface with an up link 01:22:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) getsockname$l2tp6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000040)=0x20) [ 2995.076353][ T8849] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2995.102528][ T8891] bond169: (slave bridge240): Enslaving as a backup interface with an up link 01:22:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xfeff, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:31 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400208) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/147, 0x93}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) [ 2995.212886][ T8912] tipc: Not found cipher: "gcm("! [ 2995.218524][ T8922] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2995.252426][ T8922] device bond170 entered promiscuous mode [ 2995.283371][ T8923] tipc: Not found cipher: "gcm("! [ 2995.317314][ T8951] bond170: (slave bridge241): making interface the new active one [ 2995.332752][ T8951] device bridge241 entered promiscuous mode [ 2995.349877][ T8951] bond170: (slave bridge241): Enslaving as an active interface with an up link [ 2995.398450][ T8951] bond170: (slave bridge242): Enslaving as a backup interface with an up link [ 2995.408156][ T8922] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x9]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="5426f958", @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:22:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xff0f, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:33 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000240)={0x9a0000, 0x3, 0x100, r0, 0x0, &(0x7f00000001c0)={0x990a30, 0x8, [], @p_u8=&(0x7f0000000180)=0x4}}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r7 = dup(r6) dup(r7) r8 = syz_open_dev$mouse(&(0x7f0000000800)='/dev/input/mouse#\x00', 0x1f, 0x100) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000840)={0x9c, 0x0, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_SOCKETS={0x3c, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r0}, {0x8}, {0x8}, {0x8, 0x1, r1}, {0x8, 0x1, r4}, {0x8, 0x1, r0}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r0}, {0x8, 0x1, r5}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}, @NBD_ATTR_SOCKETS={0x4}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4040004}, 0x20004801) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) ioctl$SNDRV_PCM_IOCTL_RESUME(r10, 0x4147, 0x0) 01:22:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d2804d2c7fc02ad600be3c96f265f6c2ea060f20774443b2f1436139ee23bbd8e05ed81146aa1744e0fb73674ec"], 0x54}}, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) [ 2997.547921][ T8974] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2997.623240][ T8974] device bond171 entered promiscuous mode [ 2997.649912][ T8983] bond171: (slave bridge243): making interface the new active one [ 2997.660138][ T8983] device bridge243 entered promiscuous mode 01:22:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0xa]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2997.666965][ T8983] bond171: (slave bridge243): Enslaving as an active interface with an up link [ 2997.685536][ T8974] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2997.729579][ T8983] bond171: (slave bridge244): Enslaving as a backup interface with an up link 01:22:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000040)=r3) ptrace$cont(0x18, r0, 0x98, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'erspan0\x00', {0x2, 0x4e20, @empty}}) 01:22:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xff7f, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 2997.910203][ T9041] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2997.942031][ T9041] device bond172 entered promiscuous mode 01:22:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0xc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 2997.989022][ T9041] bond172: (slave bridge245): making interface the new active one [ 2998.001534][ T9041] device bridge245 entered promiscuous mode [ 2998.011160][ T9041] bond172: (slave bridge245): Enslaving as an active interface with an up link 01:22:34 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="e9000000", @ANYRES16=r0, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) [ 2998.059026][ T9041] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2998.097034][ T9087] bond172: (slave bridge246): Enslaving as a backup interface with an up link 01:22:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec5316", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xfffe, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:36 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm-monitor\x00', 0x474802, 0x0) sendto$inet(r2, &(0x7f0000000500)="23862b2ab046cb0f1cdf6e4906db1736bc221e4d24724b9af78aaf71bb2794d5b636dd5767d843f2f4d634802d4432d870831751543381de2b91583bc68a1beee00c5afc3ff012f155eccf5d67b589f5239ccf6cda9bca323c", 0x59, 0x14000, &(0x7f0000000580)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "13f054ea1ea1ab6f", "ae8c33f879f7dbc92dea91f91db8ef13fba2f773b2db2928d26d6e7e8b8d98ec", "ecbb05f6", "950089e90d57d9ad"}, 0x38) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:22:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x10]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:36 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x20}}, 0x20004080) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="5800000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000400000280012800b000100697036746e6c000018000280140202002001000000000000000000000000000008000a00", @ANYRES32=r6, @ANYBLOB="c16677d849c5dd33318067cbc581149c5efecd1241a599f4c98b98bccfc49b35bf5f393eb14de59aa3a4c9df0a1cbb7a5b74d3401a2888fe4f511a4c1c26450c0c6deefd58d3b308da3f46328a20dba9348f4d9f787c910e3dd91ba97fc69ab0c0a5a3c50c7145be43b30ed7dd62daa4a4dfe1cc239fee1ea98d3368cc30f7658d79ce5ab636d377e8c2dab2ef56b9c74ec9415d8e0f44f9cf6f414ae5f76a3e9daf8c7a0e236eed7e7bf799efb471f1cea4cde5d86500"], 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20, 0x14000}, [@IFLA_LINKINFO={0xfffffffffffffcae, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}}}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_PHYS_PORT_ID={0x7, 0x22, "0c0678"}]}, 0x58}}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000d40)={&(0x7f0000000880)={0x494, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [{{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x60c2}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x8c, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x170, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x44, 0x4, [{0x5, 0x7f, 0x7, 0x8}, {0x7, 0x40, 0x1f, 0x100}, {0x1, 0x0, 0x5, 0x58}, {0x7f, 0x81, 0x80, 0x3}, {0x33d, 0x4, 0x7, 0x1000}, {0x2, 0x40, 0x9}, {0x3f, 0x2, 0x7f, 0xffffffff}, {0x6, 0x81, 0x5f, 0x5}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xced}}, {0x8, 0x6, r9}}}]}}]}, 0x494}, 0x1, 0x0, 0x0, 0x20000080}, 0x80) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 3000.581149][ T9103] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3000.624544][ T9103] device bond173 entered promiscuous mode [ 3000.637003][ T9102] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3000.648093][ T9102] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3000.689024][ T9105] tipc: Not found cipher: "gcm("! [ 3000.724956][ T9142] bond173: (slave bridge247): making interface the new active one [ 3000.733177][ T9142] device bridge247 entered promiscuous mode [ 3000.740818][ T9142] bond173: (slave bridge247): Enslaving as an active interface with an up link [ 3000.750735][ T9144] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3000.765616][ T9103] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2accfa0fdd73cca57ab44e314a5d70c2a1122f025039aa108266b1e77fc4c3254c6f7f6da6e3c1382137d147b10143103de71096d6ddfa514cdcc21d", @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r2, 0xf505, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x5, 0x5, 0x8009, 0xe25e, 0x0, 0x5, 0x2a82, 0x0, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r5, 0x4) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r6 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000200)={r8, @in={{0x2, 0x0, @empty}}, 0x3ff}, 0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200)={r8, 0x762}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x9, 0x8201, 0x1, 0x1, 0x7, 0x8000, 0x5, r9}, &(0x7f0000000340)=0x20) 01:22:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x20000, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3000.792157][ T9142] bond173: (slave bridge248): Enslaving as a backup interface with an up link [ 3000.802855][ T9144] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3000.848057][ T9144] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 01:22:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x12]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3000.888541][ T9162] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:36 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x3, 0x222a774a, 0x7f, 0x7fffffff, 0x6}) 01:22:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) ptrace$cont(0x18, r2, 0x2000000000003a, 0x8) [ 3000.942884][ T9162] device bond174 entered promiscuous mode [ 3000.982136][ T9199] bond174: (slave bridge249): making interface the new active one [ 3000.990572][ T9199] device bridge249 entered promiscuous mode [ 3000.997764][ T9199] bond174: (slave bridge249): Enslaving as an active interface with an up link [ 3001.031550][ T9162] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:37 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8802, 0x0) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000140)={0x0, 0x1f}, 0x2) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) dup(r5) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000240)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x4}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/81, 0x51}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000600)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000000680)=""/199, 0xc7}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) [ 3001.049212][ T9199] bond174: (slave bridge250): Enslaving as a backup interface with an up link 01:22:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb6c, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3001.149802][ T9223] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3001.181953][ T9223] device bond175 entered promiscuous mode [ 3001.204230][ T9223] bond175: (slave bridge251): making interface the new active one [ 3001.212038][ T9223] device bridge251 entered promiscuous mode [ 3001.219946][ T9223] bond175: (slave bridge251): Enslaving as an active interface with an up link [ 3001.262461][ T9223] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3001.282348][ T9262] bond175: (slave bridge252): Enslaving as a backup interface with an up link 01:22:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0xfc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:39 executing program 5: r0 = socket(0x1a, 0x6, 0x401) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$DRM_IOCTL_FREE_BUFS(r5, 0x4010641a, &(0x7f00000001c0)={0x5, &(0x7f0000000000)=[0x1, 0x2, 0xfffff8f2, 0x5, 0x100]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r6 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f0000258f88)={{0x1, 0xee01}}) msgctl$MSG_INFO(r6, 0xc, &(0x7f0000000140)=""/115) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb6d, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) ptrace$getregset(0x4204, 0xffffffffffffffff, 0x1, &(0x7f0000000040)={&(0x7f0000000100)=""/231, 0xe7}) [ 3003.664039][ T9270] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0xa, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRESOCT=r1, @ANYBLOB="010000000000000000001700008c400006803c00040067636d28"], 0x54}}, 0x20004000) [ 3003.739636][ T9270] device bond176 entered promiscuous mode 01:22:39 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 3003.781829][ T9282] bond176: (slave bridge253): making interface the new active one [ 3003.791809][ T9282] device bridge253 entered promiscuous mode [ 3003.801063][ T9282] bond176: (slave bridge253): Enslaving as an active interface with an up link [ 3003.822558][ T9270] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:39 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e23, @private=0xa010102}, {0x2, 0x4e20, @rand_addr=0x64010102}, 0x0, 0x0, 0x0, 0x0, 0xa9, &(0x7f0000000140)='ip6tnl0\x00', 0x4, 0x3ff, 0x59f}) r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x181802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) mmap$snddsp_status(&(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x0, 0x20010, r4, 0x82000000) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) r7 = dup(r6) ioctl$BLKZEROOUT(r7, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$sock_inet_SIOCGIFBRDADDR(r7, 0x8919, &(0x7f0000000000)={'veth1_macvtap\x00', {0x2, 0x4e22, @multicast2}}) r8 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x20000000000000cd, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r1, &(0x7f0000004740)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000002400)=""/178, 0xb2}}, {{&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000001040)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/157, 0x9d}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/170, 0xaa}, {&(0x7f0000000540)=""/121, 0x79}, {&(0x7f0000000480)=""/34, 0x22}], 0x5, &(0x7f0000000780)=""/186, 0xba}, 0x4}, {{&(0x7f0000000640)=@ethernet, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/208, 0xd0}, {&(0x7f0000000940)=""/72, 0x48}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f00000009c0)=""/126, 0x7e}, {&(0x7f0000000a40)=""/236, 0xec}, {&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/133, 0x85}, {&(0x7f0000000c00)=""/196, 0xc4}, {&(0x7f0000000d00)=""/94, 0x5e}], 0x9, &(0x7f0000000e40)=""/129, 0x81}, 0x8}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000f00)=""/146, 0x92}, {&(0x7f0000002040)=""/176, 0xb0}, {&(0x7f0000002100)=""/110, 0x6e}, {&(0x7f0000002180)=""/227, 0xe3}, {&(0x7f0000002280)=""/87, 0x57}, {&(0x7f0000002300)=""/205, 0xcd}, {&(0x7f0000004880)=""/250, 0xfa}, {&(0x7f0000000fc0)=""/10, 0xa}], 0x8, &(0x7f0000004640)=""/217, 0xd9}, 0x1000}], 0x5, 0x12106, &(0x7f0000000740)={0x0, 0x989680}) socket$netlink(0x10, 0x3, 0xf) [ 3003.861432][ T9282] bond176: (slave bridge254): Enslaving as a backup interface with an up link 01:22:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) capset(&(0x7f0000000000)={0xf1504, r0}, &(0x7f0000000040)={0x3, 0x7, 0x7f, 0x5, 0x5, 0x6}) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYRESOCT=r2, @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:22:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb6e, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3004.072637][ T9343] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3004.127710][ T9343] device bond177 entered promiscuous mode [ 3004.141491][ T9368] bond177: (slave bridge255): making interface the new active one [ 3004.151518][ T9368] device bridge255 entered promiscuous mode [ 3004.159006][ T9368] bond177: (slave bridge255): Enslaving as an active interface with an up link [ 3004.174105][ T9343] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3004.191834][ T9368] bond177: (slave bridge256): Enslaving as a backup interface with an up link 01:22:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:42 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x8001}, 0x8) r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x2]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) ioctl$KVM_GET_TSC_KHZ(r3, 0xaea3) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) dup(r6) getsockopt$inet6_int(r6, 0x29, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r7 = dup(r4) dup(r7) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @rand_addr=0x64010100}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e24, @multicast2}, 0x252, 0x0, 0x0, 0x0, 0x840b, &(0x7f0000000000)='ip_vti0\x00', 0x3, 0x1f, 0xffff}) 01:22:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb6f, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3006.782226][ T9395] tipc: Not found cipher: "gcm("! [ 3006.787998][ T9399] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3006.825261][ T9399] device bond178 entered promiscuous mode [ 3006.854116][ T9406] tipc: Not found cipher: "gcm("! 01:22:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x3]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636da9a9b4d654a02861afdfe317ee5029baf0f2953de1e5a3eccf78418721c475511ab87642e0f4b954fdfa9ca26b068abdb99a97681ff40a0e3752c12ae74bc7cb2d"], 0x54}}, 0x0) [ 3006.916685][ T9410] bond178: (slave bridge257): making interface the new active one [ 3006.931682][ T9410] device bridge257 entered promiscuous mode [ 3006.948025][ T9410] bond178: (slave bridge257): Enslaving as an active interface with an up link 01:22:42 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) r2 = dup(r1) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:22:42 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) sendmsg$IPSET_CMD_RENAME(r5, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x5, 0x6, 0x301, 0x0, 0x0, {0xc, 0x0, 0x3}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x84414}, 0x810) [ 3006.965275][ T9399] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3006.998302][ T9410] bond178: (slave bridge258): Enslaving as a backup interface with an up link 01:22:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000000)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) r2 = syz_open_pts(r1, 0x6043) ioctl$TIOCL_GETKMSGREDIRECT(r2, 0x541c, &(0x7f0000000040)) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x21) 01:22:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb70, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x4]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3007.226403][ T9471] tipc: Not found cipher: "gcm("! [ 3007.231982][ T9476] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3007.312673][ T9476] device bond179 entered promiscuous mode [ 3007.337001][ T9487] bond179: (slave bridge259): making interface the new active one [ 3007.351883][ T9487] device bridge259 entered promiscuous mode [ 3007.358941][ T9487] bond179: (slave bridge259): Enslaving as an active interface with an up link [ 3007.371802][ T9476] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3007.399862][ T9487] bond179: (slave bridge260): Enslaving as a backup interface with an up link 01:22:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x110080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) alarm(0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0xfe, 0x0, 0x3, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x2812, 0x100, 0xca, 0x0, 0x8, 0x2, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) wait4(0x0, 0x0, 0x80000002, 0x0) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) 01:22:45 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0xa30000, 0x1, 0xff, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9909db, 0xff, [], @ptr=0x8000}}) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x3000, 0x1}) r2 = dup(r0) dup(r2) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) r4 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000200)={0x20, 0x13, 0x2, 0x2, 0xfdfd, 0x0, 0x0}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x5, r6, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x10001}, {0xa5d, 0x4e}], r6}, 0x18, 0x1) sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="540004f8d9e22b00", @ANYRES16, @ANYRES16=r2], 0x54}}, 0x0) 01:22:45 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x7, 0x1, 0x201, 0x0, 0x0, {0x2, 0x0, 0xa}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x4800) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000140)=""/66, 0x42}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) msgget$private(0x0, 0x1) 01:22:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x5]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb71, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) ptrace$cont(0x7, r0, 0xffffffff, 0x3158a06) 01:22:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r2, 0x508, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x7f}]}, 0x2c}}, 0x4000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) [ 3009.815367][ T9543] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3009.920989][ T9543] device bond180 entered promiscuous mode [ 3009.964116][ T9550] bond180: (slave bridge261): making interface the new active one [ 3009.972788][ T9550] device bridge261 entered promiscuous mode [ 3009.980966][ T9550] bond180: (slave bridge261): Enslaving as an active interface with an up link 01:22:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb72, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3010.021309][ T9555] tipc: Not found cipher: "gcm("! [ 3010.028655][ T9543] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3010.051298][ T9550] bond180: (slave bridge262): Enslaving as a backup interface with an up link 01:22:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f00000001c0)=0x9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000240)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000140)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/198, 0xc6}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000001000000000000000006803c00040067636d28"], 0x54}}, 0x0) [ 3010.107664][ T9617] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3010.191557][ T9617] device bond181 entered promiscuous mode [ 3010.211806][ T9633] bond181: (slave bridge263): making interface the new active one [ 3010.220553][ T9633] device bridge263 entered promiscuous mode [ 3010.230522][ T9633] bond181: (slave bridge263): Enslaving as an active interface with an up link [ 3010.247975][ T9617] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3010.275431][ T9633] bond181: (slave bridge264): Enslaving as a backup interface with an up link 01:22:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x6]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}, 0x1, 0x0, 0x0, 0x1b5f85b3fa34c1e0}, 0x0) 01:22:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) fcntl$notify(r2, 0x402, 0x27) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) r5 = open(&(0x7f0000000100)='./file1\x00', 0x164142, 0x0) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)={0x160, r6, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x94, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2f82ded3}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3fd5cc0b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x21bc68c2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x88}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x38}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c44d66a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2c9af2f2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ed99594}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4500228a}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x4c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2a6f16ba}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1e98}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4135}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ba1a323}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xda79}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1da6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf50}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x3c, 0x8, 0x0, 0x1, [{0x4}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4880ad7c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6dde6b18}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaa}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x54dcba93}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x160}, 0x1, 0x0, 0x0, 0x8800}, 0x4000811) sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000600)={0x1dc, r6, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x8c, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2b63f226}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x125dca52}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa09f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2a9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x24d5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26907e18}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xd1180e8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x378e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a9ddeb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa31d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x465b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4229}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a0dc60a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbc6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa60e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x13c5c6b1}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0xe0, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5efb4ca2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3a714a66}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5b4c6483}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x33ad66ec}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1bdf0346}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x34}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x472834d1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x71e2bbce}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x38ad283a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x75181d75}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4cb6c707}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x374cec6c}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x770d7655}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x383f437c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe071e48}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3ff70b0a}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e9649b6}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1052bebb1368dcaa}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}]}, 0x1dc}}, 0x4000845) dup(0xffffffffffffffff) r7 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r7, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) pidfd_getfd(0xffffffffffffffff, r7, 0x0) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb73, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3012.878626][ T9668] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3012.931165][ T9668] device bond182 entered promiscuous mode 01:22:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x5, r5, 0x0) quotactl(0xff, &(0x7f0000000040)='./file0\x00', r5, &(0x7f0000000100)="954fb94f60a6bda8c0ff7f8a43621292b9f1cefaa23f78f7d44d4e069c096b2d8cb80b0990d173edd3a7d0f20c5df32493368d01ef11566f93a7c39d8d3d808daefaecc9baec34aa6b3f519296094e2b665475bf69dc0486743c419f3694a35c96412045ace7") ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) setsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000)={0x1, 0x4, 0x0, 0x7e, 0x1, 0x6, 0x20, 0x0, 0x70, 0x2, 0x8, 0x40, 0x6}, 0xe) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@un=@abs, &(0x7f0000000080)=0x80) [ 3012.978401][ T9670] tipc: Not found cipher: "gcm("! [ 3013.016799][ T9708] bond182: (slave bridge265): making interface the new active one [ 3013.031045][ T9708] device bridge265 entered promiscuous mode [ 3013.051464][ T9708] bond182: (slave bridge265): Enslaving as an active interface with an up link 01:22:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3013.077133][ T9723] tipc: Not found cipher: "gcm("! [ 3013.082205][ T9668] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000180)='&\x00') r5 = add_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="a584b539275e94fb557b0575152dd6920a747d2c16cec531164b683a57ca7742a3e71a0541cae395c441a5971c7b9bb9ee5e37904b9603336b1e9ca6a27f0e2f2c4d619a667a9ce46d069de02e317224a6df6fa1d519bcffd83c552b69ee42dc478c1f2c83f7dea3162394831a16f2f12eeb2eecfdb0f44c9a846c51a8c802637df2241483fc2a57e2cd97a869ce37b6e165b8a2f01426e75fdf55c28bfeff2fa885869e5fe11b8cebc10ef956217999e9e2f0b868", 0xb5, r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000300)={r5, 0x2e, 0xe4}, &(0x7f0000000340)={'enc=', 'oaep', ' hash=', {'tgr160-generic\x00'}}, &(0x7f00000003c0)="47399d0634efbeecb78b7d2f2b831a45517231e9a825b2d26b8aee8009ed7dfb9ef5bce0fc41b9ae4fd106c12811", &(0x7f0000000400)="97f6f2db6f1e4121ae5098aea769bc187948d57e377bcdf18da2b3a592a9a944531d52eecae8c6cd9980907ae4eeec82ff91eec614a3cd381a74f7217db78d26eb0619ac2fb1e7bda53f107139d8f4e40c4355e91675088762e1f5a7de76b94dc96d8bcdca0316c4c75e360eef407f7200b176f6a119ab3ee25de1d85274d18ea367dca3bdc84411108cf07fd71b461ce2ff4308fab5b577a51acb35747f738cfa58bf41bb4990085f79cbdf6f4375d728ab8b91bd3f296c2549ccdf40b03e5ceb45c3db91928d38519db9110bb4ed7d9be8d995d51dd3b99145d63cfef575ea5f5ec877") dup(r2) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000100)={0x800, 0x1, 0xc, "8c95f055f2fd1da5f97b12751430a8ce9871b224118a88b52e1eb537e0148c5bacfca515b31b27050d1fcf6dbbf07fc0692357e95ac2d89f70c4ac24", 0x1d, "9414a64e900f496bd15bbfd82adbe96a01e58300cc7471a9a71b0004d9730b7892f254d503c1e2f1ef90728119feaec1afcc5800fdb6b727933059f3", 0x60}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3013.189016][ T9708] bond182: (slave bridge266): Enslaving as a backup interface with an up link 01:22:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb74, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x8]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f000000b440)={r1, 0x3f, 0x6, 0x2}) sendmsg$NFT_MSG_GETFLOWTABLE(r4, &(0x7f000000b780)={&(0x7f000000b480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f000000b740)={&(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x26c}, 0x1, 0x0, 0x0, 0x10}, 0x800) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000000)={0x2, 0x16, 0x4, 0x402, 0x0, 0x0, 0x0}) fcntl$getown(r5, 0x9) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000f00)=""/104, 0x68) r7 = dup(r6) dup(r7) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000600)=@nat={'nat\x00', 0x1b, 0x5, 0x5a8, 0x0, 0x3b8, 0xffffffff, 0x180, 0x180, 0x4d8, 0x4d8, 0xffffffff, 0x4d8, 0x4d8, 0x5, &(0x7f0000000140), {[{{@uncond, 0x0, 0x138, 0x180, 0x0, {}, [@common=@unspec=@physdev={{0x68, 'physdev\x00'}, {'veth1_to_batadv\x00', {}, 'veth1_to_bridge\x00', {}, 0x0, 0x4}}, @common=@hl={{0x28, 'hl\x00'}, {0x1, 0x9}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x15, @ipv4=@broadcast, @ipv6=@rand_addr=' \x01\x00', @port=0x4e23, @icmp_id=0x67}}}, {{@uncond, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x4d6, 0x4d6], 0x80000000, 0x1}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4=@loopback, @port=0x4e24, @port=0x4e22}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@eui64={{0x28, 'eui64\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv6=@private1={0xfc, 0x1, [], 0x1}, @ipv6=@local, @port=0x4e24, @port=0x4e20}}}, {{@uncond, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}, {0x3c, 0x3e, 0x40, 0x65, 0x8196, 0x0, 0x440}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x1e, @ipv6=@loopback, @ipv4=@multicast2, @port=0x4e21, @icmp_id=0x68}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x608) [ 3013.371765][ T9751] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3013.461653][ T9751] device bond183 entered promiscuous mode 01:22:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r4 = accept(r3, 0x0, &(0x7f0000000000)) r5 = socket(0x0, 0x0, 0x0) close(r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, r7, 0x1, 0x0, 0x0, {0x3}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5}]}]}, 0x20}}, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r5, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="000429bd701cffdbdf2595f1a726f2fa304a000000060800020003000000"], 0x24}, 0x1, 0x0, 0x0, 0x10000044}, 0x20000000) r8 = dup(0xffffffffffffffff) r9 = dup(r8) ioctl$BLKZEROOUT(r9, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r10 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x80200, 0x0) ioctl$LOOP_CHANGE_FD(r9, 0x4c06, r10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='/\x00\x00\b', @ANYRES16=r7, @ANYBLOB="00032cbd7000fddbdf25050000000800030006000000"], 0x1c}, 0x1, 0x0, 0x0, 0xe880}, 0x2477cf105c99fec1) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYRESDEC=r5, @ANYRES16=r11, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) [ 3013.519142][ T9759] bond183: (slave bridge267): making interface the new active one [ 3013.554755][ T9759] device bridge267 entered promiscuous mode [ 3013.580656][ T9759] bond183: (slave bridge267): Enslaving as an active interface with an up link [ 3013.648225][ T9751] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3013.692357][ T9759] bond183: (slave bridge268): Enslaving as a backup interface with an up link 01:22:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x9]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:51 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r5 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @loopback}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r7, @in={{0x2, 0x0, @empty}}, 0x3ff}, 0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000040)={0x1, 0x5, 0x208, 0xa9, 0x3630f89a, 0xe6cc, 0x3f, 0x3, r7}, &(0x7f0000000080)=0x20) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000000)={0xfffffbff, 0xfff, 0x1}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:22:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb75, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:51 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r7 = dup(r6) dup(r7) ioctl$TIOCSERGETLSR(r7, 0x5459, &(0x7f0000000300)) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="48e300000008010200000000000000000073797a30000000000900010073797a300000000006000240888e00001400048008000740000080000800094008200008"], 0x48}, 0x1, 0x0, 0x0, 0x20000009}, 0x810) ioctl$CAPI_GET_SERIAL(r5, 0xc0044308, &(0x7f0000000240)=0x5) recvmmsg(r0, &(0x7f0000000000)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380), 0x5, &(0x7f0000002400)=""/191, 0x1f9}, 0xfffffffd}], 0x4000000000001de, 0x2006, &(0x7f0000003700)={0x77359400}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x8c, 0x0) setresgid(0x0, 0x0, 0x0) bind$unix(r4, &(0x7f0000000280)=@abs={0x0, 0x0, 0x4e24}, 0x6e) [ 3015.950584][ T9816] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3016.005141][ T9816] device bond184 entered promiscuous mode [ 3016.019586][ T9848] bond184: (slave bridge269): making interface the new active one [ 3016.031374][ T9848] device bridge269 entered promiscuous mode [ 3016.040456][ T9848] bond184: (slave bridge269): Enslaving as an active interface with an up link [ 3016.071724][ T9816] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3016.113916][ T9857] tipc: Not found cipher: "gcm("! 01:22:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0xa]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3016.140833][ T9848] bond184: (slave bridge270): Enslaving as a backup interface with an up link 01:22:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x40) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) r6 = dup(r5) ioctl$BLKZEROOUT(r6, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r8 = dup(r7) r9 = dup(r8) ioctl$BLKZEROOUT(r9, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$SIOCGSTAMP(r9, 0x8906, &(0x7f0000000000)) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x3}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) prctl$PR_GET_FP_MODE(0x2e) 01:22:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb76, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x8, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000100)={{0x1, r2}}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000003c0)=[0x3, 0x1f]) r3 = gettid() ptrace$setregs(0xf, r3, 0x7, &(0x7f0000000000)="b5da00647f456514ff0ead8e01422f244cb8b824d44b0afad06317") wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) process_vm_writev(r3, &(0x7f0000000280)=[{&(0x7f0000000100)=""/182, 0xb6}, {&(0x7f0000000040)=""/52, 0x34}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000080)=""/5, 0x5}], 0x5, &(0x7f0000000380)=[{&(0x7f0000000300)=""/35, 0x23}, {&(0x7f0000000340)=""/31, 0x1f}], 0x2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, 0x0, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@dev, @in=@broadcast}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x21) [ 3016.320183][ T9883] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0xc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3016.392440][ T9883] device bond185 entered promiscuous mode [ 3016.430365][ T9915] bond185: (slave bridge271): making interface the new active one 01:22:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000140)={0x0, 0x3, 0x1ff, 0x1f}, 0x8) recvmmsg(r0, &(0x7f0000002300)=[{{&(0x7f0000000080)=@ipx, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/69, 0x45}, {&(0x7f0000000240)=""/88, 0x58}], 0x2, &(0x7f0000000300)=""/11, 0xb}}, {{&(0x7f0000000340)=@phonet, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/8, 0x8}], 0x1, &(0x7f0000000440)=""/119, 0x77}, 0xb5}, {{&(0x7f00000004c0)=@xdp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000540)=""/4, 0x4}, {&(0x7f0000000580)=""/99, 0x63}, {&(0x7f0000000600)=""/122, 0x7a}, {&(0x7f0000000680)=""/122, 0x7a}, {&(0x7f0000000700)=""/254, 0xfe}, {&(0x7f0000000800)=""/135, 0x87}, {&(0x7f00000008c0)=""/37, 0x25}], 0x7}, 0x80}, {{&(0x7f0000000980)=@phonet, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000a00)=""/89, 0x59}, {&(0x7f0000000a80)=""/80, 0x50}, {&(0x7f0000000b00)=""/136, 0x88}, {&(0x7f0000000bc0)=""/36, 0x24}, {&(0x7f0000000c00)=""/93, 0x5d}, {&(0x7f0000000c80)=""/168, 0xa8}, {&(0x7f0000000d40)=""/216, 0xd8}, {&(0x7f0000000e40)=""/180, 0xb4}], 0x8, &(0x7f0000002440)=""/150, 0x96}, 0x3}, {{0x0, 0x0, &(0x7f0000002240)=[{&(0x7f0000001040)=""/99, 0x63}, {&(0x7f00000010c0)}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000002100)=""/34, 0x22}, {&(0x7f0000002140)=""/241, 0xf1}], 0x5, &(0x7f00000022c0)=""/36, 0x24}, 0xd841}], 0x5, 0x6, &(0x7f0000003700)={0x0, 0x3938700}) [ 3016.440370][ T9915] device bridge271 entered promiscuous mode [ 3016.453014][ T9915] bond185: (slave bridge271): Enslaving as an active interface with an up link [ 3016.468018][ T9883] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb77, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3016.490710][ T9915] bond185: (slave bridge272): Enslaving as a backup interface with an up link [ 3016.566909][ T9938] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3016.617237][ T9938] device bond186 entered promiscuous mode [ 3016.639290][ T9973] bond186: (slave bridge273): making interface the new active one [ 3016.668940][ T9973] device bridge273 entered promiscuous mode [ 3016.678768][ T9973] bond186: (slave bridge273): Enslaving as an active interface with an up link [ 3016.696781][ T9938] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3016.718250][ T9973] bond186: (slave bridge274): Enslaving as a backup interface with an up link [ 3016.805663][ T9857] tipc: Not found cipher: "gcm("! 01:22:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:54 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x1) sendto(r1, &(0x7f0000000600)="120000001200e7ef447b1a3fcd40000000019344be5eba0958d165f4f5ca593062fe2513fb3f97574ba8e059540d2df64bd2eccaae599e5999032e01ca61f8f62698b1340f3bd85b989e83f3c2480c60c0bff0cfd303fab83769ce8eb40b72f780e7dfee614addfec03f6b3d0e2d39fae7b83a1c4e0f2e1636bdd036402ed5fc846cd3bb600197f9200cb2d5588e4392bb20f90c2e66d26c80ba1ad757eeb9910f1e4053d81abf48bcf730961b3b215b49c6667b0e050261c121383023a2eb577875806818bedb0854d365f57fb9942e1a5675336895469fcde0248b8c1b453cedfdf0f139f3fee528e7f33faf5ce6cef7031de9b9c40f74982a655a2d09acbddb30d441dac0b468ee0000e910571e81a2a3774b69bae6e1cd4d417a", 0xffffffffffffffe3, 0x48004, 0x0, 0x30) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x10]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb78, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4c000001", @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) [ 3018.979125][ T9992] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create(0x3f1) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000080)={0x1, 0xd0, 0x7}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000077e635f9cc9c2cd8ef7535b2106712a179995a38ff00234a4686ef68f6760eb6e937b9e41b927d1a7c9a98d36fcd6175cae58b476b212b2b", @ANYRES16=r2, @ANYBLOB="010020002800"/20], 0x54}}, 0x0) 01:22:55 executing program 5: r0 = socket(0x15, 0x4, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000002400)=""/191, 0xbf}, 0x400}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) sendto$l2tp6(r5, &(0x7f0000000240)="717709d17cae4752c19d248fc8f73518b43ce2be7fb7d12e79f7410ecb56403792ca27945bbea25caa0d994e868ebb947835c9aea13e1b1694bcfffb2e06259bc7cbcfb2d40aeb1196b506eaad7ac5d7cffdab3c19b7382689476654826c0e2d68e8cd17af944bd636829d34c6cfd612767b2ff6c98de8f58312f37f90d7f659cf62a15059f624bd4b9cc780a9cbf2811276d91d9c5662bda89bf1e1ab5c0ba193f2b13c4451c13275236fa69d6686e3f1f5e2b28af9371d5c45c7922c26d892189ee65eeb39deffc95dad55110f8cb88acf8e20496ace8e5a2b4d394dff8ff8", 0xe0, 0x4008800, &(0x7f0000000080)={0xa, 0x0, 0x7659, @initdev={0xfe, 0x88, [], 0xfa, 0x0}, 0x1, 0x2}, 0x20) [ 3019.084707][ T9992] device bond187 entered promiscuous mode 01:22:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x12]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3019.129606][T10016] bond187: (slave bridge275): making interface the new active one [ 3019.151955][T10016] device bridge275 entered promiscuous mode [ 3019.160155][T10016] bond187: (slave bridge275): Enslaving as an active interface with an up link [ 3019.191178][ T9992] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3019.233106][T10016] bond187: (slave bridge276): Enslaving as a backup interface with an up link 01:22:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = getpid() wait4(r1, &(0x7f0000000000), 0x8, &(0x7f0000000100)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:55 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) r2 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @empty}}, 0x3ff}, 0x90) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r4, 0x10001}, &(0x7f0000000140)=0x8) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f0000000180)=0x9) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r6 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r6, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r7 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r7, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, &(0x7f0000000080)=@usbdevfs_connect={0x3ff}) sendmsg$TIPC_NL_KEY_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYRES16=r7, @ANYRESHEX=r6, @ANYBLOB="01f00000000000160000170000004019068028e83c0004006f636d28a44c72741be36d787b838054cb633d439eb3b83a7cd2e200f389567737a0eb645a3e647339eca9bc4f4ff4aa0e529b78ec1b26e6caade6fe51d07be4edada5c29625cf8020d50844a4dc61b8f2811d693e48d5e840f39fc877c0846fb11a6370eb130e550c67bc670d4b937885aac9f2b255e549945ce357354d478b5b233783cf947474e043fd12413819438cf0b06be7d84e39179d56d595bbadd7fc3b405c47b2e56be6c0dd746b1ea47518b75dfb89ce75e92e8162063e5758c08bbae7f46805d2df15ef0b3bdb603a3212a11d920d71453f44bb2dfacc5bab5d"], 0x54}}, 0x0) 01:22:55 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = dup(0xffffffffffffffff) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) setsockopt$inet6_IPV6_HOPOPTS(r4, 0x29, 0x36, &(0x7f0000000a80)={0x2b, 0x31, [], [@padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x2, 0x9b, "4e995a6d0861fe84fc753a3eecf5ac39cc12fa1efcc924e60c8001539b571b2539b773048784b90a11216a6a9403e4f4e38555c56cbff41d83525cc68da645b6b843e0267a81a1f76934bed75aa2b8778fdaa1ee540ed1d51dd96917280085df5caa322e9427cea3e7f13ef1acd2c38544c2494b38f282e019e169f48a7ced946d693e196cb0a992960c04b56e90cf767b6f173982018b0b1b8a49"}, @generic={0x85, 0xce, "84cba153968d533ea93c2e1c2372611812097a4648972032bc552d8ef5d2208ebedc6a88765f35fe15fd136606e1fdffd63fb8363c5c77f939a0c3769407d1778189e43abd1ccf8cd6c896139192680f15e870ac0ec38266f845edbc0d33f86015a5a94b04631ab98fb7c37ee13e1d986d10fae3807cca4f8be9c57f268009532e5502c0e3e556f0b7e7bf4003e640d6579cf97869ffc10c0615840d53566c42526969a8125673c17447c09c15eac6fc7679c9080e2b9333d0d04261c313f3eed2b6bb020f5848cef847c2029e15"}, @enc_lim={0x4, 0x1, 0x7}, @hao={0xc9, 0x10, @private1}]}, 0x198) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@gettfilter={0x2c, 0x2e, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r5, {0x4, 0x10}, {0x0, 0xfff3}, {0x0, 0xfff1}}, [{0x8, 0xb, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x880}, 0x41000) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000140)) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x82480, 0x0) write$binfmt_elf64(r8, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xff, 0x0, 0xc0, 0x100000001, 0x2, 0x3e, 0x9, 0x302, 0x40, 0x32e, 0x3d, 0x5, 0x38, 0x1, 0x8, 0x9, 0x9}, [{0x58000001, 0x7, 0xff, 0x2, 0x3, 0x3f, 0x944a, 0xfff}], "113ebc0e904cb834010a6d26b4e9c7f4f6aa6f1c4d627009a079cf1414b7a1e36e83a1bfabdb7de10c8d0c427edc89a2c8cddf19e1bd71053905cbdc718d89a321c97ffb3652cc3ad27ac9f5f98a3567e9f93560652521f13bb93e9103a52c232cacd60a4614dfa93ff0713e50f48f127fcf216eafb33bece6858474fd7c2dbfcd54b06d65b4778e2ee92cc536579a4b51320f9e6e0db85cf448fca21ee662767a782051853110d9ceb4f0b2e5cc327cb17c6a98e81462a83f751047a0e7a22a6a2ea17371dfed6028988bf2bc35d74c6d3c4694f8f07dbbbe8024ca9e6eab837df06028a48cb66c3a86eacd6d1b", [[], [], []]}, 0x466) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb79, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3019.399701][T10061] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3019.457886][T10061] device bond188 entered promiscuous mode [ 3019.484958][T10088] bond188: (slave bridge277): making interface the new active one [ 3019.493080][T10088] device bridge277 entered promiscuous mode [ 3019.499792][T10088] bond188: (slave bridge277): Enslaving as an active interface with an up link [ 3019.517984][T10061] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3019.542011][T10088] bond188: (slave bridge278): Enslaving as a backup interface with an up link 01:22:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0xfc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:22:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb7a, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:57 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:22:57 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') [ 3022.006542][T10116] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r4 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESHEX=r0, @ANYRES64=r3, @ANYRES16=r1, @ANYRES16=r2, @ANYRESOCT=r3, @ANYRESHEX=r4], 0x54}}, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) dup(r6) write$capi20(r6, &(0x7f0000000080)={0x10, 0x2, 0x84, 0x83, 0x200, 0x5}, 0x10) 01:22:58 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r2, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x80}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x5ee505bf}, @ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x8040}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) [ 3022.101465][T10116] device bond189 entered promiscuous mode [ 3022.156009][T10135] bond189: (slave bridge279): making interface the new active one [ 3022.165265][T10135] device bridge279 entered promiscuous mode [ 3022.172015][T10135] bond189: (slave bridge279): Enslaving as an active interface with an up link [ 3022.185498][T10116] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:22:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3022.254253][T10171] tipc: Not found cipher: "gcm("! [ 3022.277703][T10135] bond189: (slave bridge280): Enslaving as a backup interface with an up link [ 3022.320672][T10178] tipc: Not found cipher: "gcm("! 01:22:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/250) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "e9aa9a81ff680ec2", "982c390b4b587a52a7160c10db9bd74b4e951f3c216c3c3e7ac41d5231b976dc", "fe8efa9a", "e04f3f8964887950"}, 0x38) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="08968fcb68da4734cb6b954bfe63c69279713062b42b654708", @ANYRES16=r3, @ANYBLOB="110000000000000000000200000008000300", @ANYRES32=r5, @ANYBLOB='\b\x00@\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:22:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb7b, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:22:58 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_GET_SECUREBITS(0x1b) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="641e1612bc2cbbe35f5d4ca3ebbe74f54aa9956deb064512b9fd222b27b64836e0a6283315ff1de7592a01e90ddb3a944cf0383c0155f370", @ANYRES16=r2, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:22:58 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r4, 0x0, 0x3, &(0x7f0000000140)=':{\x00', r5}, 0x30) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000300)) dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x102) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r7, 0xc10c5541, &(0x7f0000000600)={0x6, 0x3, 0x1}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 3022.482716][T10195] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3022.548264][T10195] device bond190 entered promiscuous mode [ 3022.569757][T10209] bond190: (slave bridge281): making interface the new active one [ 3022.580161][T10209] device bridge281 entered promiscuous mode [ 3022.587486][T10209] bond190: (slave bridge281): Enslaving as an active interface with an up link [ 3022.601694][T10195] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3022.617305][T10209] bond190: (slave bridge282): Enslaving as a backup interface with an up link 01:23:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x2]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5400016dba7ec32be6c9900b4548ef57da8b00e9ab101e925e04fab04dd5dbf17b16631dbdefa9d4ac0d2afca6ffcec7aba9645d333b6d9151f212b1e678df8a910aee5553131273479b87", @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb7c, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:00 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000440)='/dev/vcsu#\x00', 0x8000, 0x200000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8982, &(0x7f0000000540)={0x7, 'bridge0\x00', {}, 0x6}) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) r6 = dup(r5) ioctl$BLKZEROOUT(r6, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$CAPI_SET_FLAGS(r6, 0x80044324, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r8 = dup(r7) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000002c0)=""/56, &(0x7f0000000300)=0x38) r9 = dup(r8) ioctl$BLKZEROOUT(r9, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) recvmmsg(r9, &(0x7f00000001c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000240)=""/95, 0x5f}, {&(0x7f0000000080)=""/92, 0x5c}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000600)=""/77, 0x4d}, {&(0x7f0000000680)=""/154, 0x9a}, {&(0x7f0000000340)=""/2, 0x2}], 0x8, &(0x7f0000002400)=""/191, 0xbf}, 0x400}], 0x1, 0x6, &(0x7f0000003700)) [ 3025.081430][T10250] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f2, 0x400, 0x70bd25, 0x25dfdbfd, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x11}, 0x40040) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRES16=r1, @ANYBLOB="018000000000004154388e000000400006a03c00040067070000001902772c4b0500e5f9bc"], 0x54}}, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x2, 0x400002) ioctl$VIDIOC_S_INPUT(r4, 0xc0045627, &(0x7f0000000040)=0x100) [ 3025.126657][T10250] device bond191 entered promiscuous mode [ 3025.190931][T10288] bond191: (slave bridge283): making interface the new active one [ 3025.206970][T10288] device bridge283 entered promiscuous mode [ 3025.217273][T10288] bond191: (slave bridge283): Enslaving as an active interface with an up link 01:23:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x3]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3025.265263][T10250] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3025.293642][T10288] bond191: (slave bridge284): Enslaving as a backup interface with an up link 01:23:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb7d, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3025.429101][T10311] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:01 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r2 = dup2(r0, r1) ioctl$PPPIOCDISCONN(r2, 0x7439) r3 = dup(r0) dup(r3) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r3, 0xc01864b0, &(0x7f0000000000)={0x1, 0xd66d, 0xd, 0x6}) r4 = socket$nl_generic(0x10, 0x3, 0x10) msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f00000002c0)) capget(&(0x7f0000000100)={0x19980330, r6}, &(0x7f0000000140)={0x0, 0x3f, 0xbc, 0x3, 0x17d, 0x4}) sendmsg$TIPC_NL_KEY_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x2002) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x7, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x501880, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r5 = dup(0xffffffffffffffff) dup(r5) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r3, &(0x7f0000001040)="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", 0x1000, 0x1, 0x0, 0x0, r5}, &(0x7f0000000140)) ptrace$cont(0x20, r1, 0x0, 0x21) [ 3025.489382][T10311] device bond192 entered promiscuous mode 01:23:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x9, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x4]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3025.549144][T10343] bond192: (slave bridge285): making interface the new active one [ 3025.559148][T10343] device bridge285 entered promiscuous mode [ 3025.566999][T10343] bond192: (slave bridge285): Enslaving as an active interface with an up link [ 3025.643434][T10353] tipc: Not found cipher: "gcm("! [ 3025.648564][T10311] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3025.676801][T10343] bond192: (slave bridge286): Enslaving as a backup interface with an up link [ 3025.686296][T10353] tipc: Not found cipher: "gcm("! 01:23:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:04 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x40, r4, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5fc}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2e6}]}, 0x40}, 0x1, 0x0, 0x0, 0x24044000}, 0x24008010) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xbc, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x26}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x74}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6a}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x40}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40}, 0x4000) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb7e, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRESDEC=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r4, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0xffff8001}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x401}, @NL80211_ATTR_WIPHY_ANTENNA_TX={0x8, 0x69, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x48004) 01:23:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x5]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3028.155912][T10386] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="5800000010001fff000100000000000000000000ee70eadc377711397ab4d835ecd844ade4135d8aef417463b63cbec764a097eb6b2a201c214e06ce46b29254f281c722b20756c22c5104", @ANYRES32=0x0, @ANYBLOB="0000000000400000280012800b000100697036746e6c000018000280140002002001000000000000000000000000000008000a00", @ANYRES32=r6, @ANYBLOB="08001e0004000000"], 0x58}}, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYRESOCT=r3, @ANYRES16=0x0, @ANYBLOB="10002bbd7000fdeadf250100000008000100", @ANYRES32=r6, @ANYRES32=r6], 0x1c}, 0x1, 0x0, 0x0, 0x4000890}, 0x2) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r7 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r7, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r8 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r8, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) dup(r8) setsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, &(0x7f0000000000), 0x4) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000017000000400006803c00040066636d28"], 0x54}}, 0x0) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x428402, 0x0) ioctl$EVIOCGBITSND(r9, 0x80404532, &(0x7f0000000080)=""/46) 01:23:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x408080, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x68, r4, 0x100, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x7f, @link='syz0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4008000) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x21a000, 0x0) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r7, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB='e|\x00\x00', @ANYRES16=r8, @ANYBLOB="00042bbd7000fedbdf250100000005001400810000000c000f00030000000000000005000d0001000000050012000400000014001f00fc00"/70], 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) r9 = dup(r6) ioctl$BLKZEROOUT(r9, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r9, 0x6, 0x15, &(0x7f0000000040)=0x1eb9, 0x4) [ 3028.246408][T10386] device bond193 entered promiscuous mode 01:23:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x6]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3028.316091][T10408] bond193: (slave bridge287): making interface the new active one [ 3028.330895][T10408] device bridge287 entered promiscuous mode [ 3028.349108][T10408] bond193: (slave bridge287): Enslaving as an active interface with an up link [ 3028.409637][T10448] tipc: Not found cipher: "gcm("! [ 3028.417497][T10408] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:04 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, 0x0, 0x1) recvmmsg(r5, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000240)=""/168}, {&(0x7f0000000300)=""/140}, {&(0x7f00000003c0)=""/192}, {&(0x7f0000000480)=""/183}, {&(0x7f0000000540)=""/213}, {&(0x7f0000000640)=""/214}], 0x8, &(0x7f0000002400)=""/191, 0xe2}}], 0x1, 0x6, &(0x7f0000003700)={r3, r4+60000000}) [ 3028.560973][T10457] tipc: Not found cipher: "gcm("! 01:23:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb7f, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:04 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r6 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x8000, 0x0) ioctl$CHAR_RAW_FRASET(r9, 0x1264, &(0x7f0000000600)=0x3f) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000200)={r8, @in={{0x2, 0x0, @empty}}, 0x3ff}, 0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000000)={0xc6c, 0x3, 0xb, 0x7479, 0xffffffff, 0x7, 0x7, 0x3, r8}, &(0x7f00000001c0)=0x20) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0xa, &(0x7f0000000140)=[{0x0, 0x0, 0x2, 0x4}, {0x9, 0x40, 0x7f, 0x80000000}, {0x3, 0x3, 0x96, 0x9}, {0x8, 0x90, 0x5, 0x1f}, {0x3a, 0x75, 0x40, 0x3ff}, {0xd5a, 0x5c, 0x0, 0x4}, {0x8, 0x2, 0x0, 0x10001}, {0x0, 0x6, 0x2, 0x8}, {0x0, 0x3, 0xbd, 0xe2}, {0xfff7, 0x3, 0x1, 0x800}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 3028.679039][T10486] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3028.733792][T10486] device bond194 entered promiscuous mode [ 3028.758180][T10491] bond194: (slave bridge289): making interface the new active one [ 3028.767695][T10491] device bridge289 entered promiscuous mode [ 3028.776905][T10491] bond194: (slave bridge289): Enslaving as an active interface with an up link [ 3028.790851][T10486] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3028.808190][T10491] bond194: (slave bridge290): Enslaving as a backup interface with an up link 01:23:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0xb) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x4ac082) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) dup(r2) r3 = dup(0xffffffffffffffff) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0xfffffffffffffff7}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf, 0x8010, r3, 0x8000000) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) read$snddsp(0xffffffffffffffff, &(0x7f0000000100)=""/100, 0x64) 01:23:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x1f, 0x100) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000100)={0x9, "679fbf20576c9ef42c53cbd9816966c89482f977cfcd8525ed522db5f9d5ec1c", 0x1}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) dup(r6) r7 = inotify_add_watch(r6, &(0x7f0000000080)='./file0\x00', 0x2000000) inotify_rm_watch(r4, r7) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="54d7abf9768f2770c54438d83f9972f08c57792000b4091a1446b240615dbfa4b0f72802b3c2430dd9fb08649ef52e761ff31333c3daf29ef07222c469b712ac74204bf904a274dc922c4cd67bb0aa3a75fe8265551138069b3b6a621a87a8264b5c758c9ed7130c70021aed3173", @ANYRES16=r2, @ANYRES32=r2], 0x54}}, 0x20000000) 01:23:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x8]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb80, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:07 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ocfs2_control\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000240)={0xe7, 0x9, 0x5, 0x2e}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x90001, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40800}, 0x4004081) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 3031.198836][T10534] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) tgkill(r0, r0, 0xc) r1 = dup(0xffffffffffffffff) r2 = dup(r1) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x1ff, 0x0, 0x1, 0x9}, {0x9, 0x40, 0x20, 0x1b}, {0x0, 0x81, 0xa, 0x2007}]}) vmsplice(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f0000000100)="d43b5c46f83a1796be3ec4f8e98aea16fadc574e594f744ecea142a8e43d03b7555c7bbc8c3579aa4ef264afda7095212abb35ab1f98feb46fd55639c2a846736c77836c8ad67b9199e59f24a1dade1f1bb2535a28258ba417fac172923e9b9db27b9f9aab097621bdbabe1f438ecde0ea064d3e670a949b14724ea82a6a9e13922ac5a943e54963bb517f4c8570325d3882a1e44d335ee61e4a6851381d417ef770b2ae568fd72eb109007fd00e876b01aacb9a6aacbc299b38666af61871a6a0c9dd133c3f381e3d6968f44a77f01f584f314be7c89e9d32d429fd62fda93fb86faf0918ca9d6ed4e52bf9c9707a16", 0xf0}, {&(0x7f0000000200)="803234e993d08cebcf0e8eee55aed77fbc1bd1741d44783c84b73c55777ac647b532157f38b2e0b761e867a8253b50c014a3f30563254539f95ac84610ffebfdfa0ea1775954d7884581f7b0e79ab8953c4bab95f07739f0606bd37eff488bbaa5805cc023c2fc391b44b568bdd2b23f59ea379448b014d1a03183b28ed5cf15a338b850de8d", 0x86}, {&(0x7f0000000300)="a8f738fc87b3e317e71b547bea737307359673677f2e2b873b326d178b35798c209ff189935569df83b4907a97b578456739c092723017d4329aff5651f645cea1dc83e50f7954263d6ad76979026a7605eabb8206b82a108900de3f0a36cef13468594db02703c3bf3fb88b6adcfab1deedae7c620054d26036dadcbdcc41c4030279f753777775b919a261cd5c0097904382186aa92858d011de69f4e7450d2fe3671012e952723741b417370b65159a2b2c89839a55e7fe67c74fbf25e57dbde5a319363d665958ba784cfbed422a4f0b7e5f13ed79c9f7cf0009ea6fa6778025c3533aa4d2b3", 0xe8}, {&(0x7f0000000400)="7f6287f423a62ecc6399290199a85f8562eaf2bcb6dd343a07eb508ba1d8b1629fd1f276cd593e1862b7bd5f03afe6d0c35041ad36b07c09e0df039ab65db7c307fd2a591b67ffbf0d3ce7af91050f59a77459280b8303d6720e11cbc3dea8bcbc111016885c6fbc6eec5cb7bc31d105ecdbc7aa95e0a3fd4eaccb616ef6d36399908a83546167c592d0520b51f61d26d7d6d22d32ce206ca5ec15afaa6138648ce6bd4c12d38b6e7aa11f12e12276433d9934c6f6b001e922e247bd659809301cd35cdb90852003bf604435393bd6dee7eb6008c713436ae4f933a46db19cd59c34eb1eaeee37fc7f4fbdbd988d414d48d9", 0xf2}], 0x9, 0x3) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000002c0)) tkill(r3, 0x3b) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) tkill(r4, 0x1d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x1f) [ 3031.314177][T10534] device bond195 entered promiscuous mode [ 3031.366366][T10544] bond195: (slave bridge291): making interface the new active one 01:23:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x9]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3031.415254][T10544] device bridge291 entered promiscuous mode [ 3031.434247][T10544] bond195: (slave bridge291): Enslaving as an active interface with an up link [ 3031.466404][T10534] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3031.510156][T10544] bond195: (slave bridge292): Enslaving as a backup interface with an up link 01:23:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb81, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='\f\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000127bd7000fddbdf250e000000080006000001000008000500ffff00003000028006000b000200000008000600060000000800060006000000140001000000000000000000000000000000000008000600060000000800040002000080"], 0x64}, 0x1, 0x0, 0x0, 0x24040000}, 0x24008010) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r4, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x7ff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40804}, 0x4000000) 01:23:07 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='devices.list\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r5, 0x4b4e, 0x1a) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r7 = dup(r6) dup(r7) recvmmsg(r7, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000140)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0xa]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3031.660755][T10609] tipc: Not found cipher: "gcm("! [ 3031.666572][T10607] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3031.728727][T10607] device bond196 entered promiscuous mode [ 3031.762338][T10615] bond196: (slave bridge293): making interface the new active one [ 3031.770486][T10615] device bridge293 entered promiscuous mode [ 3031.779591][T10615] bond196: (slave bridge293): Enslaving as an active interface with an up link [ 3031.802219][T10617] tipc: Not found cipher: "gcm("! [ 3031.810280][T10607] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3031.840508][T10615] bond196: (slave bridge294): Enslaving as a backup interface with an up link 01:23:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x88, r2, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x80000000}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x82a}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x88}, 0x1, 0x0, 0x0, 0x80}, 0x4000041) 01:23:10 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r4, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x81) 01:23:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb82, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0xc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3034.289089][T10683] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3034.336090][T10683] device bond197 entered promiscuous mode [ 3034.413410][T10684] tipc: Not found cipher: "gcm("! 01:23:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x10]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x9, 0x3, 0x318, 0x0, 0xffffffff, 0xffffffff, 0x110, 0xffffffff, 0x248, 0xffffffff, 0xffffffff, 0x248, 0xffffffff, 0x3, &(0x7f0000000100), {[{{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x8, 0x9, 0x64, 0x3ff, 'syz1\x00', 'syz0\x00'}}}, {{@ipv6={@remote, @dev={0xfe, 0x80, [], 0xc}, [0xffffff00, 0xffffff00, 0xffffff00], [0x0, 0xffffffff, 0xff, 0xffffffff], 'rose0\x00', 'geneve0\x00', {0xff}, {}, 0x87, 0xfa, 0x4, 0x1}, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x3}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x19, 0x2, 0x400, 0x9, 'snmp\x00', 'syz0\x00', {0xdef2}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) ioctl$KDGKBMODE(r4, 0x4b44, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e21, 0x100, @private2={0xfc, 0x2, [], 0x1}, 0x9}, {0xa, 0x4e23, 0x1, @private1, 0x10001}, 0x8, [0xde, 0x9, 0x10001, 0xdd, 0x9, 0xd8, 0x3, 0x7]}, 0x5c) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) r1 = semget$private(0x0, 0x8, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000100)={{0x1, r3}}) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000040)=[0x40]) umount2(&(0x7f0000000080)='./file0\x00', 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r4 = dup(0xffffffffffffffff) dup(r4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x2, 0x30}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={r5, 0x4}, 0x8) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x2000, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3034.456429][T10726] bond197: (slave bridge295): making interface the new active one [ 3034.496033][T10726] device bridge295 entered promiscuous mode 01:23:10 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x46}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 3034.527944][T10726] bond197: (slave bridge295): Enslaving as an active interface with an up link [ 3034.560903][T10683] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3034.597325][T10726] bond197: (slave bridge296): Enslaving as a backup interface with an up link 01:23:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x4, 0x100049) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000000, 0x8440) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB=':\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="040027bd700000000000020000000c00060002000000000000000c00020002000000000000000c00020004000000000000"], 0x38}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r4, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008081}, 0x4000000) r5 = dup(r2) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$KVM_X86_SET_MCE(r5, 0x4040ae9e, &(0x7f0000000040)={0x400000000000000, 0x2000, 0xff, 0x2, 0x19}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x3) 01:23:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb83, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000100)={'syztnl0\x00', r5, 0x700, 0x20, 0x400, 0x4, {{0x45, 0x4, 0x0, 0x9, 0x114, 0x67, 0x0, 0x80, 0x29, 0x0, @local, @local, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x4c, [@remote, @private=0xa010101, @multicast2, @empty, @local]}, @lsrr={0x83, 0x7, 0xc, [@loopback]}, @generic={0x89, 0xe, "45a4a4c2355e30db44f7f017"}, @lsrr={0x83, 0xf, 0x66, [@loopback, @empty, @private=0xa010100]}, @timestamp_addr={0x44, 0x4c, 0xf6, 0x1, 0x8, [{@rand_addr=0x64010102, 0x46eb}, {@loopback, 0x51}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@multicast2, 0x9}, {@local, 0x2}, {@empty, 0x7}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x9f0}, {@loopback, 0x3f}, {@broadcast, 0x8}]}, @rr={0x7, 0x1b, 0x50, [@broadcast, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @multicast2, @rand_addr=0x64010102]}, @timestamp_addr={0x44, 0x2c, 0xa1, 0x1, 0x6, [{@broadcast, 0x9}, {@empty, 0x7}, {@multicast1}, {@private=0xa010101, 0x5}, {@dev={0xac, 0x14, 0x14, 0x1a}, 0x40}]}, @generic={0x89, 0x5, "80d329"}, @lsrr={0x83, 0x27, 0x21, [@rand_addr=0x64010102, @local, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x15}, @private=0xa010102, @remote, @empty, @dev={0xac, 0x14, 0x14, 0x18}, @local]}]}}}}}) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3034.685961][T10750] tipc: Not found cipher: "gcm("! [ 3034.796849][T10777] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3034.865967][T10777] device bond198 entered promiscuous mode [ 3034.890402][T10798] bond198: (slave bridge297): making interface the new active one [ 3034.898732][T10798] device bridge297 entered promiscuous mode [ 3034.906527][T10798] bond198: (slave bridge297): Enslaving as an active interface with an up link [ 3034.920270][T10777] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3034.940528][T10798] bond198: (slave bridge298): Enslaving as a backup interface with an up link 01:23:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x12]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:13 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000017000000400006803c000400568ec43b"], 0x54}}, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x96e, 0x80102) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) r4 = dup(r2) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$TCSETSW(r4, 0x5403, &(0x7f0000000000)={0x9, 0x5, 0x7fff, 0x0, 0x15, "1998162d86f3ace6b3cc0f407b25d421b11864"}) 01:23:13 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) fsetxattr$system_posix_acl(r3, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES64, @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYBLOB, @ANYRESHEX, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="6ea1fab76319511550b5eb12cc136238427ef33b60e8f34b70a011c65d3605a831787a7f902a8ff567ec5f35500808fec223139326223f343b3fb807dde3f578129bf304bcc7dabc5dd962d14c7419a82a4e680e7f4604a254c1abe02c86a2b000000000000000bd1efbc202befcedbf0cf56f93a2700a67076d417ccc4138329177724c754bb542b335ed318d94d76c2272f05e88cd1b7e5b1b69980ca4db483b06a68f11dbfcfbe7db93d8f928d81f2ad68bb4da1d4668cdcd350551dd490261d6c8422953b027ea3fe7d39d", @ANYRES32, @ANYRESHEX=r4, @ANYRESHEX, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="d5300000", @ANYRES32], 0x8c, 0x0) r6 = getgid() r7 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) fsetxattr$system_posix_acl(r7, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES64, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYBLOB, @ANYRESHEX, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="6ea1fab76319511550b5eb12cc136238427ef33b6044a5e53922f8a4e8f34b70a011c65d3605a831787a7f902a8ff567ec5f3550080832c223132613a017261134339b0035cd5d27bc809326223f343b3fb807dde3f578129bf304bcc7dabc5dd962d14c7419a82a4e680e7f4604a254c1abe02c86a2b0", @ANYRES32, @ANYRESHEX=r8, @ANYRES32=r9, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="d5300000", @ANYRES32], 0x8c, 0x0) setresgid(r5, r6, r9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r11 = dup(r10) r12 = dup(r11) ioctl$BLKZEROOUT(r12, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$EVIOCGBITKEY(r12, 0x80404521, &(0x7f0000000600)=""/4096) 01:23:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb84, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3037.366769][T10832] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') pause() r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="e0000000ba79287176d85df755961a17b3dc6ebe7f420a28ffd3041e0c4cbc8dfa6a0650e600c941d6bb4dec11cc293831eb16bc6a3372327320743dafde14a0515ba4d9797b", @ANYRES16=r1, @ANYRESHEX=r2], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r6, @in={{0x2, 0x0, @empty}}, 0x3ff}, 0x90) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={r6, 0x3}, 0x8) r7 = dup(r3) dup(r7) 01:23:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3037.459605][T10832] device bond199 entered promiscuous mode [ 3037.488728][T10851] bond199: (slave bridge299): making interface the new active one [ 3037.499474][T10851] device bridge299 entered promiscuous mode 01:23:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0xfc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3037.508550][T10851] bond199: (slave bridge299): Enslaving as an active interface with an up link [ 3037.523164][T10832] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:13 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/autofs\x00', 0xa61fbcf586e14b72, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x38, 0x1406, 0x800, 0x70bd2a, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20040800}, 0x10) r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000600)="711a618b1bc68c545e4dc177cbfc48d214c73f7de4e2071fd85b88cf9a908157131fe7e036d555e2babe8de29fff5a75f8fc0baf9b96dda06dc89af5df73639a6b9570b6f1663e2fab3e144779801909e88938ffc9b7521e5030ce4341799340879f9b9f988db8e88c23dc2860182a43fbb997229c3dc8f66b03800f5e577536d72d27cdc80e10b7cc9b266bc417a003ac49127f48b1f964c61242fc1807a71f9d970f376749f3718d237ae449319eee90db44f2430e549087d54a256293ccb24c89080b3ca5ee28bd74116b5443091513e9fb6f1890c0089d5d30976c2d358d9f36b08ba1e8156c40cd69957962626870f258", 0xf3, r3}, 0x68) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x8800, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="5800000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000400000280012800b000100697036746e6c000018000280140002002001000000000000000000000000000008000a00", @ANYRES32=r8, @ANYBLOB="00ecffffdf000000"], 0x58}}, 0x0) connect$packet(r5, &(0x7f0000000240)={0x11, 0x18, r8, 0x1, 0x3, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000700)={0x3, &(0x7f0000000300)=[{0x80000006, 0x0, 0x0, 0xffffffff}, {0x100, 0x8, 0x5, 0xcbc1}, {0x2, 0x7e, 0xec, 0x7fff}]}, 0x10) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3037.555984][T10851] bond199: (slave bridge300): Enslaving as a backup interface with an up link 01:23:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb85, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3037.650596][T10898] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3037.662334][T10901] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3037.688929][T10901] device bond200 entered promiscuous mode [ 3037.714603][T10901] bond200: (slave bridge301): making interface the new active one [ 3037.723260][T10901] device bridge301 entered promiscuous mode [ 3037.730283][T10901] bond200: (slave bridge301): Enslaving as an active interface with an up link [ 3037.745460][T10901] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb86, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x16, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3037.766195][T10942] bond200: (slave bridge302): Enslaving as a backup interface with an up link 01:23:13 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x80000006, 0x0, 0x0, 0x100}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3037.866569][T10952] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3037.938235][T10952] device bond201 entered promiscuous mode [ 3037.970289][T10973] bond201: (slave bridge303): making interface the new active one [ 3037.985628][T10973] device bridge303 entered promiscuous mode [ 3037.993686][T10973] bond201: (slave bridge303): Enslaving as an active interface with an up link [ 3038.010296][T10952] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3038.053240][T10973] bond201: (slave bridge304): Enslaving as a backup interface with an up link 01:23:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x2]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:14 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000002280)={0x0, @empty, @multicast1}, &(0x7f00000022c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000002300)={'vxcan1\x00', r5}) recvmmsg(r0, &(0x7f0000001d40)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/108, 0x6c}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}, {{&(0x7f0000000140)=@l2, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000600)=""/170, 0xaa}, {&(0x7f00000006c0)=""/244, 0xf4}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/212, 0xd4}, {&(0x7f0000000000)=""/58, 0x3a}], 0x5}, 0x5}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001940)=""/246, 0xf6}], 0x1, &(0x7f0000001a40)=""/91, 0x5b}, 0x7f}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/64, 0x40}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/87, 0x57}], 0x3, &(0x7f0000001b40)=""/204, 0xcc}, 0x10000}, {{&(0x7f0000001c40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001cc0)=""/37, 0x25}], 0x1, &(0x7f0000004800)=""/4096, 0x1000}, 0x1}], 0x5, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:14 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) sched_getparam(r0, &(0x7f0000000080)) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x541c, &(0x7f00000001c0)) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="0800000091850aa9c970db083485b626dedbf6a849184352231e937ab122197330cf8dc7c56579d39753fdb53deafb9d6cc7c7f8aee3df9a28469350dbad8507fe73e0ecb6974003f39f786a06784e8aea981ac51b13364b558c703bfc08539c6e03d25b1a5e075bf20a35b1768d8b0b168f7940321d1617601409c82ea99830dfa6633154a6ed40", @ANYRESDEC=r2, @ANYRESOCT], 0x54}}, 0x40040) 01:23:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb87, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3038.419811][T11032] device bond202 entered promiscuous mode [ 3038.463883][T11079] bond202: (slave bridge305): making interface the new active one [ 3038.474056][T11079] device bridge305 entered promiscuous mode [ 3038.484239][T11079] bond202: (slave bridge305): Enslaving as an active interface with an up link 01:23:14 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 01:23:14 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) ioctl$HIDIOCGNAME(r1, 0x80404806, &(0x7f0000000180)) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) dup(r5) write$rfkill(r5, &(0x7f0000000000)={0x3f, 0x7, 0x0, 0x0, 0x1}, 0x8) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r7 = dup(r6) dup(r7) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r7, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, 0x3, 0x8, 0x101, 0x0, 0x0, {0x2}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c810}, 0x404c040) r8 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$SO_J1939_PROMISC(0xffffffffffffffff, 0x6b, 0x2, &(0x7f0000000600), 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/79, 0x4f}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000140)=""/31, 0x1f}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb88, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3038.512268][T11079] bond202: (slave bridge306): Enslaving as a backup interface with an up link [ 3038.646931][T11098] device bond203 entered promiscuous mode [ 3038.686173][T11098] bond203: (slave bridge307): making interface the new active one [ 3038.694150][T11098] device bridge307 entered promiscuous mode [ 3038.700512][T11098] bond203: (slave bridge307): Enslaving as an active interface with an up link 01:23:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x20, r0, 0x2000000000000, 0x3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000400071, 0x68081) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_DROP_PRIVILEGES(r1, 0x4004551e, &(0x7f0000000000)=0x100) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x3]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:16 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) r3 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x401, 0x0, 0x20, 0x800, r5}, &(0x7f0000000180)=0x10) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r3, 0xc0305616, &(0x7f0000000080)={0x0, {0x7, 0xbf}}) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) dup(r5) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000000)={0x3f, 0x3, 0x9, 0x5}, &(0x7f0000000040)=0x10) 01:23:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb89, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) ptrace$cont(0x3f, 0x0, 0x9, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x100, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000100)={0x0, 0xffffff1d, 0x7, r5, 0x0, &(0x7f0000000080)={0xa10901, 0x0, [], @string=&(0x7f0000000140)=0x2}}) [ 3040.954897][T11146] tipc: Not found cipher: "gcm("! [ 3040.960265][T11149] validate_nla: 4 callbacks suppressed [ 3040.960274][T11149] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3041.022360][T11149] device bond204 entered promiscuous mode [ 3041.060165][T11159] tipc: Not found cipher: "gcm("! 01:23:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="0500a8cc", @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) [ 3041.092539][T11161] bond204: (slave bridge309): making interface the new active one [ 3041.114884][T11161] device bridge309 entered promiscuous mode [ 3041.132676][T11161] bond204: (slave bridge309): Enslaving as an active interface with an up link [ 3041.165854][T11149] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x4]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3041.211645][T11161] bond204: (slave bridge310): Enslaving as a backup interface with an up link 01:23:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x34, 0x0, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}]}, 0x34}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r4}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x60, 0x0, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_STRSET_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x2004c000}, 0x4) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb8a, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x5]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3041.445270][T11233] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3041.508806][T11233] device bond205 entered promiscuous mode [ 3041.528917][T11256] bond205: (slave bridge311): making interface the new active one [ 3041.544543][T11256] device bridge311 entered promiscuous mode [ 3041.555074][T11256] bond205: (slave bridge311): Enslaving as an active interface with an up link 01:23:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x6]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3041.591756][T11232] tipc: Not found cipher: "gcm("! [ 3041.596860][T11256] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3041.622267][T11233] bond205: (slave bridge312): Enslaving as a backup interface with an up link 01:23:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb8b, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:17 executing program 5: truncate(&(0x7f0000000140)='./file0\x00', 0x2) r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:17 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x60, 0xd, 0x4, 0x2, 0x0, 0x9, 0x0}) r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000100)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x480080, 0x0) sendmsg$TIPC_NL_KEY_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000180)=ANY=[], 0x54}, 0x1, 0x0, 0x0, 0xc000}, 0x0) 01:23:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3041.739559][T11305] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3041.776773][T11318] vhci_hcd: default hub control req: 600d v0004 i0002 l0 [ 3041.832344][T11305] device bond206 entered promiscuous mode [ 3041.853074][T11339] vhci_hcd: default hub control req: 600d v0004 i0002 l0 [ 3041.865029][T11326] bond206: (slave bridge313): making interface the new active one [ 3041.873556][T11326] device bridge313 entered promiscuous mode [ 3041.880424][T11326] bond206: (slave bridge313): Enslaving as an active interface with an up link [ 3041.906159][T11305] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3041.939343][T11326] bond206: (slave bridge314): Enslaving as a backup interface with an up link 01:23:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb8c, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x24, r6, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WIPHY_RTS_THRESHOLD={0x8}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f0000000480)={0x7b0, r6, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_SSID={0xc, 0x34, "f6b99b8e3c411919"}, @NL80211_ATTR_IE_PROBE_RESP={0x77f, 0x7f, "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"}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}]}, 0x7b0}, 0x1, 0x0, 0x0, 0x43}, 0x800) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:20 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000000)={0xffffffff, 0x80, 0x800}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 3044.125932][T11373] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3044.171158][T11373] device bond207 entered promiscuous mode [ 3044.206305][T11374] tipc: Not found cipher: "gcm("! [ 3044.249134][T11408] bond207: (slave bridge315): making interface the new active one [ 3044.257100][T11408] device bridge315 entered promiscuous mode [ 3044.267402][T11408] bond207: (slave bridge315): Enslaving as an active interface with an up link [ 3044.325394][T11412] tipc: Not found cipher: "gcm("! [ 3044.330491][T11373] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3044.358519][T11408] bond207: (slave bridge316): Enslaving as a backup interface with an up link 01:23:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x8]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = dup(0xffffffffffffffff) r2 = dup(r1) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r3 = socket(0x0, 0x0, 0x0) close(r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, r5, 0x1, 0x0, 0x0, {0x3}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5}]}]}, 0x20}}, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x400, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x10000044}, 0x20000000) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x61800}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="180000009d807ab7e148cd931b7dd56e3ee2306fd6e6da6fd335dd4f6991e662e00d1e9eda41a4a703a034dd6118ef88486d4f7d788feb32c76f4a94084e86b41ad32e2e7d10e0a8919bc97231071816b10a77c351c10d288c7d36c489ce3a2f4bc20a317581a57daccf4567ba0159792c623beb751ace14cb9aa23b58ae754b8877955f6373796b", @ANYRES16=r5, @ANYBLOB="00042bbd7000ffdbdf250600000004000180"], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:20 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = syz_open_dev$usbfs(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x7fffffff, 0x0) r4 = dup2(r3, 0xffffffffffffffff) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r4, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r5, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000050}, 0x804) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x80) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:20 executing program 3: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x20100, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x20000, 0x0) ioctl$HIDIOCGFEATURE(r4, 0xc0404807, &(0x7f0000000100)={0x8, "cca577a9928bae8fe543800483dbd38e3cf5cbe899f13125c54744294c5d0b74e1e1bf96b52c4b9509d79fd15fffbf52cf525cfcac4e0fc789d9174e7535e1a3"}) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000040)={0xf3, 0xd, &(0x7f0000000480)}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYRES16=r6, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb8d, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3044.504479][T11426] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000140)={0x400, 0x1, 0x5, 0xffff, 0xfffff800, 0x81}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x141040, 0x0) sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2ab2bcca439c17bcf9900a76a530dba4cee01d3ff4a3b490f6ea8eecb087f767f97d87ce626842e68cce481d813a695cf2224d7a4f91d3e0aa6d614f3cf3ada4ddfe06bd943911ba35611e3f191f580b7da82c67fd137832b096ea3b31ee1ddc26f5f4d9de2e6e5acb8c4a18f909d80a48a409e7c97d787b2ce1c705e053e9b600b81e9e85aff3559aa70d4fe7ec5c7bf25af438a50a0583049f1cd5628f974fcf632a1163150c3bde20badcecd96803e1238c447260c8dcafbc720bd5b1e88f4c11b5", @ANYRES16, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}, 0x1, 0x0, 0x0, 0x40004080}, 0x0) [ 3044.595310][T11426] device bond208 entered promiscuous mode 01:23:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x1) getsockname(r1, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x9]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3044.638535][T11442] bond208: (slave bridge317): making interface the new active one [ 3044.656604][T11442] device bridge317 entered promiscuous mode [ 3044.675926][T11442] bond208: (slave bridge317): Enslaving as an active interface with an up link 01:23:20 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x228101, 0x0) add_key$keyring(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x5, r2, 0x0) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) keyctl$chown(0x4, 0x0, r2, r3) r4 = socket(0x10, 0x2, 0x0) sendto(r4, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x34, r8, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}]}, 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r6, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000006c0)=ANY=[@ANYBLOB="44000000b61e836d1d410e69c74ae9df09725d9985cf2ce49e8b50ebbc2b8438c9cf1a3c20e92c299c8ed13d288f6c138a08712a9068e5b65f75f463b33397a472977845ff587049aa924aad633f0af9e434bb354eed8c11d391224b8ddafbbc6069adc453da31073d11704aa0587177a4b6e3a690434876", @ANYRES16=r8, @ANYBLOB="000128bd7000fbdbdf25140000000800170003000000080007000700000008000200bfb0000008000800ab73000008000300dd4fc8420800120005000000"], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) recvmmsg(r4, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 3044.730434][T11426] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb8e, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3044.803188][T11426] device bond209 entered promiscuous mode [ 3044.868230][T11491] tipc: Not found cipher: "gcm("! 01:23:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRESOCT=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) [ 3044.904830][T11541] device bond210 entered promiscuous mode [ 3044.929137][T11541] bond210: (slave bridge319): making interface the new active one [ 3044.964090][T11541] device bridge319 entered promiscuous mode [ 3044.985038][T11541] bond210: (slave bridge319): Enslaving as an active interface with an up link [ 3045.027216][T11585] bond210: (slave bridge320): Enslaving as a backup interface with an up link 01:23:23 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000940)={0xc, @sliced={0x401, [0x3, 0x1, 0x5, 0x8000, 0x0, 0x4e, 0xb, 0x7, 0x8, 0x0, 0x7ff, 0x3ff, 0x96ab, 0x0, 0xa744, 0x800, 0xa3, 0x2, 0x8, 0x3, 0x8, 0x401, 0x6, 0xcca, 0x1ff, 0x7, 0x3, 0x800, 0xfffc, 0x6, 0x9, 0x6, 0x400, 0x7f, 0x2, 0x7ff, 0x7, 0x6, 0xa1ff, 0x5, 0x4, 0x0, 0x8, 0xfffa, 0x2, 0x7, 0x7fff, 0x5], 0x3}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/bsg\x00', 0xac40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000cc0), &(0x7f0000000d00)=0x4) recvmmsg(r0, &(0x7f0000000ac0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f00000007c0)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4084, 0xff4}, {&(0x7f0000000bc0)=""/130, 0x82}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}, {{&(0x7f0000000140)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000600)=""/70, 0x46}, {&(0x7f0000000680)=""/83, 0x53}, {&(0x7f0000000700)=""/179, 0xb3}, {&(0x7f0000000000)=""/21, 0x15}], 0x4, &(0x7f0000000400)=""/95, 0x5f}}, {{&(0x7f0000000840)=@l2, 0x80, &(0x7f0000000240)=[{&(0x7f00000008c0)=""/128, 0x80}], 0x1, &(0x7f0000000300)=""/3, 0x3}, 0x7}, {{0x0, 0x0, &(0x7f0000000a80)}, 0x33}], 0x4, 0x6, &(0x7f0000003700)={0x77359400}) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$SO_TIMESTAMP(r4, 0x1, 0x3f, &(0x7f0000000080), &(0x7f0000000a40)=0x4) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000a80), 0x4) 01:23:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0xa]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000004ec0)=[{&(0x7f0000000140)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x36}}, 0x10, &(0x7f0000000880)=[{&(0x7f0000001040)="9d221e8274a7f6cc5277cd66318b45370cda28080200c487c9575849a5b47864225cc8e1df722638b66c87615d77db9532d843cdc64ae6ea3514b1580a876a5c8f902092ac70d4b90c5fb8ac6d970129b8ef0d01874094c5b574ec0f83a7922a6d555b2fc4ee66b2d32d3dba1e47758920a387bdd16ceb14e139ae304b2b24e556db3394a3e04ec0e52492194d3129cc75b5fa328c32b0ab954540fa5044830ddb872507ff82079d1c5c978031d9c434946dec5a85b4d886407bf651af6ea0d5b8ad87ecadc618ada500dfa053a956411585d3bdce35ad01ce8dbed4970011c4252e2d157234fc3d76a72e996d127e85efd71ce0c06ed652824c6bbccf1b7a7071a74cf190b3709bdad83ea6f504322328e20ed5423414827e663792675b15f45c384a68f78f54045a4cd37afbfcbe2228f80bdb3775edd923d7936e74e6c847106e3d71eb944fdc5661294d4120b18a2df530c351414e58962566a0f308f302925d24ae39f8a608347638bbddad4d41b6d44fc413306f7044f8a38a574cc510e539f3131796916abd0d0ec4fcd02706276322664c57d355515fd16b9af8c3ede5d1a871f354b27882cf3de33cec29749605fb388b0b49f6ce79f0592087b77b9223aa1294bf620887f65204bb35a06875da1223cfdf4583c02c73d65801b1f7941e0fd1a90e47d24be2c99d4c7ff34a17e483d373c6fc61ee6535a79a0fbb7e3c5571b973fab6cfa3d8894c2fa4c3298e8373ee8f65df301fd80fcd3dc0280a537354f29cd748ddb483d364052cca2d124fc3bf18c250c6220a9ab68167400abe64b87f67629e789b92b736cb8ae200dde76cc6bdf7a79d17f147d5013be94fad4c78a46a470ea0d0638b972c3940ffddba6627aefe7f6f5f8cc0de6f56126f9e7eb62f36396925dccb59000133e2f8e92807ba5dfe80c77f6e65194c672db79747f5ced62111dfb40a0c3e029c217bddf2d32fb2881968ed6fdec18acf1696caf135bf26f1bd1d240b330fa09610d81e19e17c7f7fd4434236279d30e01af643a96fb6041da02aa75345c10781cd27ac8e519b045abadd188bdc19e2d08dced13ceb82557b6319bd85e567815e4450ec29b0f66e4b81f64a992938bacf7a7bd6166f21b5a7138530fe79637694013d8f273122284ad9176b73576a6516f0f05c406535f414ffc76d50a407c9ffed30e1db4579ee3db521c5064e875246fa54a729d8fd792d92827655983dd9345e1131bb21bad87ec98d0707f5f3f2412d9c3727225db70302dabc3306bbda2e793a68a95aeea424138dfd703acee7ca7af267269af24eacdad728a8bca639fef15aadc70b46102479a7051aaa0046f59fb3d901a00c2859904edf252abc6fd710cc6b19b649f095620115c7968b5c66a6f511112cf91311ea915150fa246d58e7415a660fbc0dd872f28a78bee0b9cb6fb3f8540044f0b7d33cac556e19060b4523d4cd75778e9e723192aede06ee38d9d674973b45b6d05408ec9d9ee46d5b38ef56e83a3f00fb2bd4b1a4d5d164288b955c9ef9db306f1c24f93411a4ea586108d4df14d8fbf075ee2ca3f83e16847e29865395b974a40d58f94e537e2c156f89d71b186863595eb15b8623d6fd023eb28585aebe92215c7e10da6cfb1fbd6f40ebfbe73a1f07c924e557e988231b38379f2029c150429dae1fb5a60559caca58dad3ed57eaf54af2c9707dbde1234d9fa6256c768d1ec54a0a91b2d63987f57c6e3f294f0aa7c9f0da9f0399128147af4b2148ec825abb3fcd6fc897be3e5e901e18cb89f794d86900b76a478b9b107e894f34e6dd1eb727fc96b6c07cda474ca6cc83b2cd091fc0ab8a16f9e81da20f15098d9b684bbc963dc5bd7f9cff11f8ef5513bac58a14963e143acec587527b99c59e3e5ca126d327f765dd53324f3724ae3afe35ea4c34b0d64ef37577273245c06269535f093273120a799d5ad46b53364a0305f69b57f222860d4ea69146a0473cce1076df8eb0d4e99a6afe3fced9b6a7d6086c38c7f26845d21110aecb815131db4f1fce3775895eb388114b1a13e59a18ff056462b56e3cf94c541e7182b2d166857c77c14761ad57f140347e5bc8df45f457accc520085a41766232da4919de0520d828523e15bdec88bbcaf58a50fec1196e7b9b0073eb0623831c5b7b90b1936d16b0112bd5ea4457df5bd469496450b57c6bd41a696fdb61b8e214e46d8ab0c5d58ffe5d64785d0f9e90d28cb527d31cb4dd15ed35119e643f522091c4e27ccaf1c66e63938a827acc9ace1a981ac16cf93b04be5d81ea8c2e6478b25f32ab50927f8891ff054ffba9bfb00ba37f008c6919be05218f9b2773148028e7b00d459fe87f59107f4698696e72fda863dca3b4b903386a54ec2f5949c6dd291d846249032fc030d2f2b731882ab95292dcbc40dfbdb6dc87538063ad26da99e0fbd0c5e5eb008ec680ebbddf68d9a1b34c0e32ed2476b37ab5930f2b9040986726651d6bda7befba56286a70f298cccbce81c3167dd0d697ff900c35bd08266602fae44076e560d977a2c910b99a410f60f81c33571907b40c7931c9ce2b20b2464d0a1d04ff37cd084ac98fc617796e353d54d329ee96f590718a8342f71b8d5d7ec0b1a41266b0f5845d3133bd5a645bba4191c1d5181c343372a52fc168f5fcbcef68f4702a654f9f00f8c130fd7c034d5c9d383a018d971a1cab0058d56a03cc45cce619ed2b5f8c36f209e1649408ae8ef3d9c3060cd7bbc012fadce18e3def00e72889863f981112cb94aa7d0c7c3935940084af783a752a65e430efe7d8cd5f7800de6e766d00d728e08b7aca3055864518137163b0f9f027e3dc9692bab9f72dfa63105a1a999ffcb70ace08ede9f18c826ec910db5105228605a671bdcb754a6f13bc0f190451bd7406b9a66669410fa75ab5059ec989e13be6b0a967287420b961fe76d80fc127764c1f7ff7b109df3d1d4989436a8d93d8dfe58e8f1d55b7013f9c738e4c3c801da3f5ec96bbfa6bb2280d6cd48890b8bcc46eedc1727a52cd97bf5c64039f470e7925b9ab6928c3836de005c7087115dd3ecbbe41d8cd4afa9ca26e9d35baff37c580b876c8a96baa2b2b8b8f9ede6793cec3d15f0a64ed677d4d987794568e3d82e7b2fb372a05a5860b70cbc6759b8de3ed186d0ea8be360f99ef63e434ea6187bff06441e70d8d326df9add0155741c84b880fd04e059e2882b80c1a5873158c4063366f62fa5654c7fc7973e366c9e028426b36fd115cc331cbc80ce93febd8a8833e0e9b22f14b9b0f9f8ca178980df7a5772c5f2c10362145e14ca8e2baed99fca79a1598976cdca419d72b51681ea345e5052ce45b2cd79fa1bdeb703c95aba4004223d387e7d78c139a81f9883409f8e77b0c614122f1851fad995a52fdd3cfe5ddb5c17bc54bbbc5a5dd5d623f2b7c06b5862db2bb3ae8408088472d569d00eb96bbf729819242d017b90de64342ee27477a5d7e10ec210fdcd01214ee231f8ba09c36b28f8971cbea49865fa688d47fda902e85dffb5b0fccbf36dc7b6fe065b99bd0f8378d2109708f354336e1c3ccba0ecd276a5dbd85e4d21f38a66c44269ed417c894256a73cc3d434ff70a7e5247569b83ec94601d9c4f781136fc947b90db0d95fc3b6c40f262cd70dbc081508d86ac016fc2080066a5920402c8380afd71673f9199d23fe1748ccf417044a6aec8100bb7c6f73db9c3e26c2617913fd691af43144db2f0b6e06185e307596f758c92e733e6f0806547f5f041da6062388ab3bc0628804ea98ec53103a73af859fe6f236a4c13cb86cd43a981bf232d1094c34b0c347e52de24511702d52c1e414dcd26c5f5108f1c97d6a1dc3fe9aa21a33c757b8db0a9a0958cd683dbf48205f369ce71dbed856b31580f8560344d989e138c65d5c25380d28c659829a1c92304966daaa61a56b47fb70ad3ef689c6615b8f852e5ed4c645c65ee0c87cb5e9b7c3b85062cacfeda5a7ad627aa05b57c4cfc119f5d50268327cd5bfe5f6993245f010d2feb9f4075ecd45520cc34c3379b03de6f697fd825cdf76a4f9ad80848f31f9fc25995fc88548a090fb4b6b409a91e74d3b4406b21109dd2847882d82ce7fe6274e005cfd9e6dc3a3e6645680aa88dee8243767d31eddff3f7e7519cb154aae9ed5c09dce79c39a2caf05ed51df295dc000e55fae6e835525cc7943859f4efe0229be63c3e5e50f6b2b6e56e4214c5a50e5208ab1106200aabd52764a682f45f76f09d6e42fae88aba53b1d247c77f2f1a3da18352c8a3873af166e9d3c650deb74e2642ebc80fd302a91538751a3e17ffed76221fb2560a5db216a016c393c9d473f5ca2c766154111c136bfac23ebb0e87f8974850aa116f0c19d0459ad2cc1cea6d2cd5c9f448cbeeb5133ef547488a50e51fdfbb301b46f488eed204c27e3c2cef54ba3506adc693b166ec60bbb3c52cdd5239db9481138e06fe1aa52d0b0933c1dcaa9921c4cf28e423a32a8dea9de1210832a757a7facfc6c2eea6a9eda08a53ed22d3e1e2cc2fe24f0e28944c73cf9bfb41645b7b231fa6fd9d2e0e4da3074c0fced9545b79ee077ad9f938043dd58c9d2c9fe433fe1c266afad50c098bfee27df3070661e51c375fef5a4f0a87f74f36ed182bec21f54c1bd0a6fad96b3df92850a66225466e2e777e97015d1335a0f4774cef02b82ec766763240f41d107c82c9e654323a375c384343391f47952d965fa95cf52005ae196f5490b096fc1d63c8a0603f719359a27e691738a1df4dfdff522f9c626da7d817c562f1eea4a7998f86b603faaf80fef48b0d1564197943b11023032591e25ce317e5c1e0622ba7bca4b1cc2b1933834b16b6cc68695a44f477f5202428bc1872b437bdd63d3196f5070c88642f82fe6df2851957206279ab1a3e317d94383b321db8669619bc244fcb7d6b3fd9d3b096bb92d1f1e3626d205cabd8c3fcc62462c86bbce443a56683f8da12aa4384210388b38e5d027c246bc30afe5936a8f8a49a442c5681d426c316baf6ec80da6a0e66830ae7c128e0108608befcea96786c5e8733e8f961df42d833a1c99d9d098b3bd74f5625bb8d98e9f10007619c02cb4792b01fe4f3609138240748e1d7e5d0de73baee388f602c6c379b20e87d3d68df37de86c82239b5ff35223587962cf255ed62df64c6c75be59103b6114f97b29854d18969d395ba1264342f38fded2f11d2f459d8f9740856b610d844f9892e1de2d3a6c586200ee8b0b10ee94bfb1dca0cb20ebb4d01422512438cfd1e65032060b13636851cbea1c7f4c53f0b149bfdc18d93737be5ffd44c80e936d7fe55c3b69c15c3b01d0642216af1b820695ee0b309ae054bd80deb90d4d2611662d7bd766408a0ef9ef85db5c71e4b85b71148d6b7fbe28d159b2e91ee16838e67881cb4360223c0e7b964e172acf4557071a452b51975968e7f270c31bdfff887ee8735634e48a3ae849f4be61c4eb18b6d0a421aa75f1be078bd1455fc94fda89cdbb7eee8e760e0169e917df95f5ffbc47a2c5b0427bc99869501ed40fcee1c6f335a0a734bf780bda017db4b125992dafba79c76a6f0233f07179449cd426d31bfc279f0674cc214688637a421f777f2454684a2f4b375823e85231eb6b163c070bbeb56b654dc9808391ce30dec02e00045d4cabf8a363cd1a4fd86b79bee2c81bfa1efcf2b288ab1a077aa2cca13051c801ef57018a484fb624593bdc0932d869e8936dfac40ef0a73f504656f74655cc6cd946b2a9ab9268f3", 0x1000}, {&(0x7f00000003c0)="6b7d4d9bf7cd1a816cce10889c1c7fa3415232afeb6197490e144554db57f6318b838dd5146f8bedc2a874949b6753210fc10a2059275ba6d0f718f8d952cc5375625a136a8ac7b75eef733b3f0d6d6ff0c1f2fd69fa011c781661f4d8e589fd7cc4a5bae15447", 0x67}, {&(0x7f0000000480)="1ca36db8ade0669584682a0203ec9806abea02f3ce71514ea7dabb7717a17915b631e507611b3234bb56ab0a28fd7792e4c03b710216f60473a13dd4cc53e7974c760baaab4d3b3b9bde39b502d7da0b2391bef3e32a5aeab34e1df3eae454458a115c42684a4baf00f76198ad933238f40c278cc93b5e830f7e036e48ba0279d45bc712edfb8ee6d2a48ad3483e0fe75f15df0f212ca62a4d61e0d041987e93c712b5462665b02b5a65742f04d9e06a13d9972f89fe889e8e9c70479c991973365c04f6d9fdc77a8fbd6ff4c4496ea16181e2c178ba4f8b987060e336559555d3756abd0a28c58af0c69229b2991110d9911da74554", 0xf6}, {&(0x7f0000000580)="355e8b370f980e64781ea72ae004960ad10c79aeb0466367e0bf4cb7365e4e09da9d0e8c3ed5e2fb694cc6dee62722f2c9853069d5a805e7fb91af573ca500ef3a45398136fee07bfc9fd16601d23ea738517f5096ec51e86b4b1b788c132f703b856d757be2b40ca04670187d5809a42d158763ec1845b60355f9178e1d67ac2797670d79b579c157876aac40", 0x8d}, {&(0x7f0000000640)="77c833ba7f132561268db27e043895f2915af5399508906af1e310ede25ba62eaaad8bc8e4fb4cad16eb21c0e448784755847021b7628c841b533afc2a2fd966908cc74827e2692a5bb640d3e32f9fe47751ddef88575f48a1d128177001a5580449a796df0028bec6ab1e2476a51325e893adaa1f67219975ad9c4b87a61a217897f6d54624dd633fcf15d9b663926c1e4097677058bbf70248136ec7f7686e6202f8b55c36eedbd4bc191a544982355c544ce8c7c51b402709fe1f48fe98fd58344655f94d5fd454e128cee3c678f9888d99dfc18c08", 0xd7}, {&(0x7f0000000180)="f9fcdf2198989b3d88590e828e9f0e9314e16acb00e35fa52d28dc02ce779c0bb7154a", 0x23}, {&(0x7f0000000740)="5732c064840c9a39fcc98a80a2442d23154c9486a1175f9b6dd03800ba3fd3742b465dcc13a12b2128e4c73b47cc0ff44b9e98701d29855d0a59536b0b944970a8ee310353ef5799aca71c755aad3e576afed4814aa1b6c5f16ea43b61c902446e4b991bff6fb77428b0f355bd9b4e0638d48b3f1473c83a730dd284d5a1ff79991798868b897afa30a5369ad32534b691c0348fefb95a3a6836a912a030f350db1305e0d512b93dd9c4c1cdbd528fd9cf45394d4bb209634592c641e0", 0xbd}, {&(0x7f0000000800)="c88507e6f9d89eac5dcf4e5207ba8bcd5ce46c56ed08b2d7f3fc0c08d279d04905023b492624f4e8b4a2db2f5a2d2a7235a9cac72ff07df7ecd572fb098cbdc9698f0e03d1e1eac9", 0x48}], 0x8, &(0x7f0000000900)=[@sndrcv={0x30, 0x84, 0x1, {0xbf, 0x9, 0x1, 0x400000, 0x2, 0x401, 0x5, 0x3}}, @sndrcv={0x30, 0x84, 0x1, {0x4, 0x2, 0x2, 0x20, 0x0, 0x7, 0x7, 0x3}}], 0x60, 0x44081}, {&(0x7f0000000280)=@in={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000980), 0x0, &(0x7f0000005100)=ANY=[@ANYBLOB="20000000000000008400000008000000fc010000000000000000000000000000180000000000000084000000060000000100000000000000180000000000000084000000050000003000000009ffffff180000000000000084000000060000000900000000000000180000000000000084000000000000000010060005007f0020000000000000008400000002000000050004000400000008000000", @ANYRES32=0x0, @ANYBLOB="3000000000000000840000000100009e681633357d6685d6ac8227776aeca500fd0d086e226676b143f29a5af43b1d3b59c4200000800000f9ffffff000001000800000005000000050000008b7e8c2f82b7be7f6f5e0de1ebef126151a47eee1ad6e6c23cf32b0f68dc255cd38962d47c91d58afd97c9a3324e2cd1fb2418ccf1abcb1b4e8c25", @ANYRES32=0x0], 0xd0}, {&(0x7f0000000ac0)=@in6={0xa, 0x4e24, 0xfff, @rand_addr=' \x01\x00', 0x7f}, 0x1c, &(0x7f0000000c80)=[{&(0x7f0000000b00)="58a21f1ba10877067d2c3b1260c81e6742d1119f4f9f33cfac35796970b49dbaf9d961936d40f29b8371ce5c111ed1a6ba10d809aaf0e0bbf8852389165752ae313a53bb1c2f4c924dc4f980461719c96904270ddeafb686968ae7a128a519", 0x5f}, {&(0x7f0000000b80)="33fe9cc1e5c1015b09c71d51a0331f5cbe199d80f8e9ae7c13be80059b90a90a43a59195a32b7e7c963cf42f65d321e7fe28f8bc86eef42b64ef98e55f4264b41480b8d87b66f8942d4044e07357f4a223f37962451db1c2461be5a8766664872193253b2879fc148b9e2e82adf5051e99de28cadf2273c17f08a2e306a92e2a2106460117399a6a99f1d7d869d605bb4d55d290cdcfc06170780787417c6783ca6e211e9a6667bf7c486cf4da2ea07dec55c2cb5aebf1cf9151b0d012d7f9389a83b575fe81f16d80eaa8af227d19da25131627f527e5befa9a3271af312ff41d7203d93350ab13538195", 0xeb}], 0x2, 0x0, 0x0, 0x50}, {&(0x7f0000000cc0)=@in6={0xa, 0x4e22, 0x7, @private2={0xfc, 0x2, [], 0x1}, 0x4}, 0x1c, &(0x7f0000000dc0)=[{&(0x7f0000000d00)="8e0760d11acb8a0570bff49b47a970cdc4076f8d55f52edcb77a9cfd38afc6d6cebce6982e377831f70f4864139bab5785cc2388ee685a9434c6cdff288537ece502382b782d597bc5350fd40f707a84a1b1e90b570f7a1a0cadb40a321725b0369d1470b7", 0x65}, {&(0x7f0000000d80)="9a4a92aedd3db1a2aaf172b2ea81", 0xe}], 0x2, &(0x7f0000000e00)=[@dstaddrv4={0x18, 0x84, 0x7, @private=0xa010101}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @broadcast}}], 0x38, 0xc0}, {&(0x7f0000000e40)=@in={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000f80)=[{&(0x7f0000000e80)="9c961cd6b19a7e12938353947b984af89babb73b79da7c471bf329d652d3d5f71e8ae386296057c2afd6f760a612ca3d2c033868c4bea10319b900a3d864d8662d7d290837ff8185e0a33d06c49dfe9ca5692986c187f021b65fdfff5ff2ee5b8de39eaa5d81215a5abcbaad747e14f297a681a3e442e8289b234166aeac20b31bbea4c26713797f44", 0x89}, {&(0x7f0000000f40)="ce388b6ae3051a4f335c27b8bf4810d9b1693ba98a063b52b913d60a83394ec60feb5b83d4adcbc339", 0x29}], 0x2, 0x0, 0x0, 0x40}, {&(0x7f0000000fc0)=@in6={0xa, 0x4e23, 0x533, @private2, 0xffff}, 0x1c, &(0x7f0000002100)=[{&(0x7f0000002040)="a95e31e067de4e713e35a6ace2e589a91722a9581a77e65f62590a1d74f03c33b55dd4f1dbc0c2111899f487b52a05b5aed8bf95d2c6251c411531499a9a312920658ad9ae3b5a84eafffad2047cf5dc3e1fa21c2194fa48998740cd6562602010bcd0082926", 0x66}, {&(0x7f00000020c0)="a1fa7d0a5c2e47874c18", 0xa}], 0x2, &(0x7f0000002140)=[@dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x64010102}, @dstaddrv6={0x20, 0x84, 0x8, @private2}, @init={0x18, 0x84, 0x0, {0x4, 0x6, 0x85, 0x6}}, @sndrcv={0x30, 0x84, 0x1, {0x13f8, 0xfffd, 0x1, 0xfffffffd, 0xfffffff7, 0x4, 0x9, 0x7fffffff}}], 0x80}, {&(0x7f00000021c0)=@in6={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, &(0x7f0000002300)=[{&(0x7f0000002200)}, {&(0x7f0000002240)="50dec890caaaa2a603b1a69ca8776b017af1d8b2bd25eee27c55b151ddc35afde74c56616009eadeaf2bb462b88b7ad8fbfef1e6aea8a712c1bfff54704456ef79e20154c59979a71b441908f5b911486cbcab343511b06ba31c7873c5e45f56198e275bc6a496dd8c3cabde1a404d29ce3cce2bde5a0d055ed2b6f21f872844a0696be4abfa37a0c27dab91b09899507620442fceb6ff130e0bf4523eaa81ddab391c1ef5a57a6d84d2b05a", 0xac}], 0x2, &(0x7f0000002440)=[@init={0x18, 0x84, 0x0, {0x4, 0x1, 0x400, 0x6}}, @sndrcv={0x30, 0x84, 0x1, {0x1c, 0x81, 0x8000, 0x1, 0x3, 0x5, 0x0, 0x6}}, @init={0x18, 0x84, 0x0, {0xd8, 0xdda9, 0x80, 0x7}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x9}}], 0x78, 0x8800}, {&(0x7f00000024c0)=@in={0x2, 0x4e22, @private=0xa010101}, 0x10, &(0x7f0000003880)=[{&(0x7f0000002500)="262df2fd77072ad5070ef7316a59336871a19e9192c8adaeba05a56cfa3c1dd4b218d238a6db9271682600b74eb9463025ddc6521879b367861ba4bd522e72cf6bafd574d92e3249bff1808b0daf6fc6a0a81c446429a9fe80409080f94ad259a5cf53713bc5f21cc43cb5a8755aba7c0e0f93fee5f8654b9ee8ebe161d75b4e3eabb20c0c2ed8aa1cd6bedfd9c2183c49ec26848bf6a6c6d7946e61960f0ecd268720a4afdc042cf17d178051f8ceb4b0ed7746515a5bc00c8d6aff9b9af89a3a6e394e8173c829674ca24b6d833faad8f08851133d8cbb3107c4", 0xdb}, {&(0x7f0000002600)="926e4af76ff98afa23771ea8efe8a604640c6cc5c1da46a84b40e3208dc63205bc79feab59ced35f32daf070c9a4907a1775bde6eda027cbb187294985811ede2d768e4076bf21f8aa6119129144cbd43197219508025367f8e446fa6ab1701df6b5", 0x62}, {&(0x7f0000002680)="3f55f405821955e09d65f88977d71b72157620561a88365687d01fe73ec22024851e60f35cef159a36f8cce6521648fd721a6a27f6f6402f39c21f68dcb1e99a49c9508153d77126c1ceb812326a56cde4dc265fafd127ccac977259b5191184cc56c27eb39f57df045fc4d2f0aae7d21c43d133938e70fa3694a8d8fdfcb0e6a90b350b7c3717ae2ec02a374f2e2000053d9eb9dada6d931fb8f99ab49c360696830d14bcf47accbb94610be2f908c46d934068612e9438d53de30abd6b7911e5fd31f2a4bd060daf5817c51613350e0a373ffc65cec2dc9f125a303910df75ef7d659705f90cbd951e4c41f7e6ea360ecb6cf8eafe7be2d7142f03f73601411e1b75bec12458612594a370c074f35240da991525161bf7e88746d4b0a5c918ea1ca1f65d287f68c0e1038858df60b2b74dcc0fae629581947315a1996ae980a44dacdb8f1df6f87ef3094f8db9783bb2c37db7086e7c2f78f041887de240caa6120e701fa151b3d95b0638f95e3655e8f6ffc0fef32fd7d94f311e77bffe590de236edf8d0441870914f24e70d90aecba27181aa6422f90f061c7976fae02c0c331548d5b0984d6de2d035e4a1c2bb928d29d4eb5162dc63caa32e316919ac734a986c5ade46158acd0c98bbabe3bf634059f2ff312705a84a51b100844c838f7dff6964b2710e4922520508299830882c0920c90cbd01a0f7b1bb8cee55e4c008efe41693ed6489db793c70bcf7db87c767b6a2e2b21e942b501c6f6ccec1269f0c730696e0bf88629ebc9297926a40b5ce2920a6ae01869f0f7a16985520d3aff72d28c1f3d94c69a4adc32e72ebd40b4691228a87a8699beabfd3dab8b790a6c900d05d4f19947079b96099545641c66928f855f8d983f94344fb1a82bb7449e95bb0138e65d0a6368434c0bc707478092de339007edb8ff92cd6d1a7d9781c23c4581b8ae4c7c8184fe4ccc7c5083393c51afd7d45e4df3c854ff5258f11540bdc734331673c279c93d9193b35f0447d2bfbcad97caa32a60a946b918ccb994bd52917e056c6d381a0df208451c12d36d943d24691c643bc06a13e302fb39641c61544d97996010293b494b2c37700715013abccc2a16ce536a7eacedcd8b9b90b73a8ef6277acf06730a47bd8f9659c7242c8737fd2e292d7cc710c81e8a54dd3232c64431fd3e1066101ce64eb40a7e22ba3a3caee7b6d9ce3c47090074ac908b67aecad3c0d0bab33c62df99129bcef17ec5537a1db442a5e2ab13f72e3bdc65178bdb9ba87819b235ccd3909415898bd469523d9e548cfee1e4061bd2053994bda327e71e5df87e64e0d599df5d42c33d44a02d50951963124976dd816a3b2676cb157a0eb1835e4854b0e8511150ad0a21b0ab66e461452d7734918263176fc3fe3490efa578d1725195d2f3d1af5394c10ef5de24cf89bc04c9185d7760c8adc20b3739778a0a863fac2bcdd6a2c1778213c43392f34fdcd40250d0f6dcb2f59c15690ae05a1e28aa9311c31acb93c9bae97acc85df0ec7c280a55f9ce0125b3d7bda224e79a0164a295aef1c617e0e02e043bd18e6df4b7e58f6ddb25be7619082da667b7de59dba0f8576e006bea689980d98d2a7a17018853989e9dc285f8abdd9a4097d6c1f194f1f4410cdd6dff7a4458c9019834797ca1e9016e8059b11fe18d7d930bfe6009156c03b17524d2829c195ba4b2629f069d0067f6a58a82eedf734fc2b130857ad834413e9b085f453450e42f13506641c0576f6cc61e5f08ebb1edf27bd40f47e7c1225415affcbdbfd908262d5fbfff917953027311c331d8b8763230c4628655c4189c900a07210592af1cc896cef20c17c8b9dd7048e05d64e0cc084e390331698b3b689609d66c8936b8990c731775cb6807d5d01cf2756a2e683d1171cee9378cd311d36b449d005f2b89d93293552befb8db5cb95ac4053e644202a67a5d90df2b396a42dcaa9a8c9e5fc828b778b211797414dacb102cc9f45a1f92da81b83510e08bf9777ec02d176448ce737d9741142f09d1439a173ad0629a03de68e291e49a24fd7c0d5cfa1a76cf6ef11160360b68f01080bfa92506d8788f9897c7bc560e91dfba8fbab77921dbe1c4edbbf1089014c51800bbd27f53701e9f4b01af072a0cb382e1d1f9bde0991570050815bb9fefe27a2fa4b88f0c7c6c199c874d7f35485cc606e1090d63545bd05f6c67cb04fdbb5ec2f0aae5014de2dc781d2cd28a808b5396cbaaf41fe0c1821b579b0137a87a53e466e0c4d0bf25d047b2e65d4021e10c5058b72604fe5e0253c0ae985dedf41eb83478ffd3ecd4f55032961cd0547df59dfe3473621043cc876cfdab5b922c986c589f2d80ea725ad4aa5ecbb610c37277d98abae0d7479d2f7a8736369362b619a2a8c819c8ea63226f5d59f41038d57f6ba5a8c4197f934b4308505ab32d2a227514d973516f67498060a2f6d08991594cd4a01eda01e23136657fdc063dbd55cf528e3b1270d3b92fc7ce758f8e0a71cabd6ab4cdedbf894c703061dc2c940f5f6405bb41a32bdd09b98be072717e948a496bf1ab820a1a037ef209b8373b3955a4ba3de9cf3405a0ab03d36343efafa61fbe36678fa233e88af3f1e988770484bd25c92e28a8443dacb1b13465392ced8c0e238fbeb7499ab4596f0453b9c5c68ae7eb6684b3c76c5d3fa2650ff9b168514196a2dfe00c18ec748d1834db5a7ecb3dc19b14743612a8664164689821a3103939f401e7253db1339bd20238dda642c7cc52a530d5bc4d980aa1d800b679ce31a24c5c408f112739b5ad6afddabdcfe8aa6b94dd232a6f41ba9c8fd7c4ae1374a29c09e8195af9d5b7d09b99be23412fbfb1b4829b6647450bd57ebb7e82e7b6d60985ed6bfb43f7d847d32821ab9a2004b8ab55a11a300a555e5939f10a79dbd42a32b58b1415217bf0f23128b99121e481441ad1d65a8c84e972c7f6f1cfc5961faebdeff7a93b17997b43ab8126732f5407daa3e3efb4ffa46b6a48fe419ebfde9f2eb05af94ba093af94dee57c998a90a95a3f971aeaa2cbcb599bcfd4ed3c4737e31f2f37613c5ec4d1e95c4d528e787e58fd39eb76f4186ccba60473eb1e821e30ccd213e00ebbb74dff0268e0f85fc4499a0b9af2557cdf539094cd46c62a54f9f18355ab86fec090352f78a21e7641ac72262ef78d33a308fb0f3032f9ee381b4921d5cbd3e735fc2f64dc945e15f6de937725b0e57a42137348de2206064ee4fc229c7dd96e8c975d274a017fc16da75cc8543807101c5293c7535f3a844bf799a96a8abd82887baf06e4ed2d44917b35ecb60bf204814c7dfd5ab0fbe563755037563792c1a7c79648800ad706f367ecb7c61ecaa6a3ed0e69ecda401c139027131451912b397bc9ac03fcdf62097d376ae5d9bd1212431f27506e450c9ac35ebd8a24a2da0705af3f8912d60c7b3d84ca330ac57f4d7477091a83ba1e1ab140872cdd607c90714f642a3c19462b626d7883c51474f5e43a8c108c70b6170ee34f650af6a836a41a1a7bb9ad4add1c654fc2f81195f871f986700f44fe564ec55f9abc10c20efd86c74df2cd0e626e2df287172f3c80579f3f9d158860fd1b1b45abc183e8b21fbab510aa74ac3724a04abaa71eb26e42112c59ec4ddb01fdb983020ae6720df71063b0fecace616e2209ea25274d5a4d2ac27a8689372daad62fc16edc8e9e3f70be2c1962af67fedb977d610d107c264a7eff57145df35e6330ae9e659ecec598a889f093ec72b5aa581e69afea652b854388d827111794914d8c60cab0433bfdb14834ef89266b9ab9490e0d15a1fef67e04203185c96b342d054ba341c3f9f59d7d49d7c1f9be95303c2c82cbe7d86f9002e91ab974dcbc67c42359c309d3c9b7259a1c191156a6fd3907d6c102d173ee08b700e42efd4b9cb1fe56d567e2cd46d9ff88c2565388b1d68ed57c8db502f9b26b74eb3e2f4041d296d3e7897f59082095754da99726b637003e623c43b387fbd6d4c9a628a7f5f541a6df43a3728ace78638f887423e87b903d8a7a09074195aaec03e9ab90f7d4be0c5c4989b10656d99b8015c121fbdfa7e81ea211884ee13320b0936420781556cf99a8da4d94807e1881054f27b869b6af82f0628dec08c475dee30b5f14e2dcec386614316a31b51db88d4c8048587f644cfdc1385861441953fe77a3f1f0dcd0b5dc38477789dc2625ecb623fa4cd0f1472ed262e178bd66eb5220d2a981cd58bb47b085728de24b2436ac46a14181366c0728fa1a256ba7b6dd6f133021dbe1ddc6b111fd00dec37c21b3c87ea7767ea349deebe8ca931da37497dbb48e360b65eedc192c36ccb2a04eaca7c407e60ac8cbc30b6994914c8c5c8ce68bc12ea97407565e2e40a821b2e50b786aed06d79e503c2ae2991276b9de4dd3bda48b524b8701d1543362b84f71179e170f04fa8cb3e9c94f1cdf39989b3106ccbd62909b3e5cc699f955df58d534aedb2033083edbb906a781ce5a197fbed329c24f28bd7a01c53debd392d74d05144a390a29468691d7acf0bbec4a63637b42b6340e038c6d806472c3f48152da0f2052fdec4cdc27b646ce9d39198350e7d199b26fbf0cc77aecd20baad8a0fc78f01330b8bde7cdf40d4bb4f363b9c7f9d3020b327aa705da434e15f5cd2277285c3f2ff083dcbd2f151d32648de856e0cec94bb7429d3f7c6932a255166109c717e11002f23d5d6d1c155185277c0a136ce860aa139c957b3104b0ab5de3028a1f9397f0ab467b4466e5418d50b031a8296943dc3e801e8204e121d5cd0d66ffa94c7908df0089fb83c0a74ef67eb25970aee2eb840b0cf1eae5922ce230c2e83dcdfbc4ccdff1e4c16fce1f86807c29a41dc6124ce24d43d41fe45ee28da2a74ebaffdaa3c781425be8d8d67c82ddfde908466672d038982e858c3b020c855f5be99f53b01414bc6197927488e5735324772296952629bc37c4e61f3e69aa08508849355f2299b483b047ea8de400115bccff691fd2193725c3686d81b0390f525366572f3bdf5d3c886869f345c56819390fe5cdbb2334b9f1445751430b502d9ebb92e614ff21f426988ea73734b248e539cc49a3c3d0fafe6175bbd3c3ac55ee1eccb23c96afa09dab6688cdf633acfb7575b65d57784545a9beae0378b0509fe7e7261c6c074d98ffc44964e81b8de057def6bc1ab6314f72479ca226776157b8abb6481776857b311f886f164ea96b7670cc223d20256a91810492f9e616abf46563880c30dde7959e3c3061604cd90c4b61a598d575bea027489420f50ded02d21a5b9987b40dbf24d63312521cbd793b910ddbadb6b777ea4abc934f73578061724f2dd13e051e009efd3cd4caa0b107af60e7d79f56421e3893f94a4b65f646efb0a9c527e0afb3d0e52b7cc687616ae49dbb43cfff7ce9bbce54e6bb16255cc1f5726903562b5ddaa12bddeadf0e7b9ead8febf300d0712ea4af25c5799ef6b31698d01baef2c42e83cd96af61209974b716dafdb692798900f55372dcecf851748d6d9677a936a605e4467a9b562a846599d53af0ed1626522bfffc9de24a1c542937cc83d59ac4a7b6925fc101cc474cc3497b35268e028bfa36e1405b22b64766a30667f7e231363a22505a8733e6820b1112febc63aba32f0bacc6e2ec4ceba01c961d0c97a6faee91a3f0d886de274d836c473aa255991b501f1882461a83f29c1d84d6fd6bc6e6386c396acc43c09201f02263018e40a48a8eca7a55ce30a342c0772cbfa11691e2", 0x1000}, {&(0x7f0000003680)="69162748d84bb41bb1bf5544876565da117ef85a1ddb627405ce2f21785ddeadbb83ebb1a92eea7569c785a97b6533146d9d3861129b3beb5e552fb60af1c5e3bdc9cc4ebd94841b747568931fea15b850d453155262651f86be4f690e8c82c2b9b374a9465fdacefa79b15611e5352d3d3f84878dfcd37e954d5a0574e5356a2ceedf2424352df8916d87540b807e8eb408defb63e6269cae5cf9bea73157b5127f0ec0ace8af25a6e5aae68bc13841ae50528a58a911c305c793bfbdeb04a4d9a866a1d26c0965a93acd", 0xcb}, {&(0x7f0000003780)="5c9b8fcef69dd2fe9e66c3126be7c4bb96884e6857a31807af06db8f64adfde3619ece5450f06fe886c1a031f0a1f1649b16dcfa67061801609f7453c20c9ecf5563e5c5b0affde50bd8f2e5d2a76144dfa06b1f59a610d4524dbec2627e94d0de3f1f0ab0bcefae4deb1367035a741c173bc3ce85100069de5a24f24e79016fe80cd36d7392769e4337ec59a1e559a74b809ded9097e452df4fdb5412352525b2de83af25dead9c8a38a99ba58f40f0f3b0cceacf6f7a8ecd44ad3afc7fcbee832c1d4286b03fd228f227143b1e036ca117026b1fb9f81a789f26af514d31831d4f07870c7c5623", 0xe8}], 0x5, &(0x7f0000003900)=[@dstaddrv4={0x18, 0x84, 0x7, @empty}, @dstaddrv6={0x20, 0x84, 0x8, @private2={0xfc, 0x2, [], 0x1}}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0xb, 0x9, 0x1f}}, @sndrcv={0x30, 0x84, 0x1, {0x200, 0x7f, 0xa, 0x2, 0x7ff, 0xffffff56, 0x4, 0x4}}, @sndinfo={0x20, 0x84, 0x2, {0x1000, 0x200, 0xcdd, 0x40}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @multicast1}}, @dstaddrv4={0x18, 0x84, 0x7, @private=0xa010100}], 0xe0, 0x2c004}, {&(0x7f0000003a00)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000003b40)=[{&(0x7f0000003a40)="656ecec3b99a2c36e371adfe28cec315bf36a3a9709cd2129d495379e86112174aade143a7985ccad8fd4d6fd58ea0c557a1144eb73219a52bbec01019f2fb4a569eac9e", 0x44}, {&(0x7f0000003ac0)="33a92b81f968660cae3ce2af47f28635a9fdfd925f773d93179c4f4a539aaeecf9e2e00ca770b43bda3d9182a8e9c47268e7c860de3e331320f79c7590b3b12fa0347747e320e7c7fad04fb87ef61df5d5db97ced9a2becc594936f105c757247702d9ab581ba99cdeb3ac139b17a841da7636aa18d20e104d34", 0x7a}], 0x2, 0x0, 0x0, 0x4000000}, {&(0x7f0000003b80)=@in={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000004e40)=[{&(0x7f0000003bc0)="4acf210e26950b38caf9ef44af6ed606e62ba067883432e5daedf7867100db43c20dff212eef3f34819cb3451c9de20f897d3adccc3f7aaa20f984930a67ea5ddc815ca4723281ef6f9dcdc6dbe60c88888a8831bc", 0x55}, {&(0x7f0000003c40)="5c6a3ec5c69515061b80484cb8fcc1766aa505f2b7b909ecb21d604084a51f9eb844a3db7ebb8c084df0e295e3a0e80d9cf460bb7cbfea7711dc8068cd9d60772e5c6ca985b7b8fa2aac6f6ac2933f630bc2b44cebf79395ade5726d4310f0931497eb3cca490f87e8eeed431026f4a400075cda3b743b18a142c2c86f5a6439413400d0f357a4a62410a89b00941db240c5ca57fd3dc0e1a5cc78c0af6a76960fe5d917aee7704deb312a307861b57bdb9fc77348f286ef4586ffa8c59cd811857b000c73c30f40dd87d53d12443c9a67a48cebdf77b4fdefec4f0f398fef89d32c2c404c", 0xe5}, {&(0x7f0000003d40)="3c07d0ecdcd6dca291352b6e137d6405c63d8b63120b968220605e99712064f1aa80f15aa30c368ac3818aae4b78f02522efa0085bb940c17fd3be001c458fc9255847470019ea850d86085d75aaf26f7afaee0a64a7b5a8433f9dd1584fd288c1645668c9dfb5ab250fa01342e18190f7771c45f8625896041f116c7e059dbf536df68b603f5b4732c0363569447db9b36ae756aa1cd43087b04e4e60701e391633a13905027200898c889b7edf51868731b818503b6e5b43c36db31b6fa6a7a906abb7f3", 0xc5}, {&(0x7f0000003e40)="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", 0x1000}], 0x4, &(0x7f0000004e80)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x18}}, @init={0x18, 0x84, 0x0, {0xfff, 0x40, 0xfff8, 0x6}}], 0x30, 0x4008004}], 0xa, 0x4008000) dup(r5) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000240)={0x1, r5}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r7 = dup(r6) dup(r7) r8 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r9 = dup(r8) dup(r9) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x54, r10, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xf0}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8001}]}, 0x54}, 0x1, 0x0, 0x0, 0x61}, 0x4000) getsockopt$bt_BT_POWER(r7, 0x112, 0x9, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x1) 01:23:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb8f, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) socket$nl_generic(0x10, 0x3, 0x10) [ 3047.608415][T11590] tipc: Not found cipher: "gcm("! [ 3047.614285][T11598] validate_nla: 4 callbacks suppressed [ 3047.614294][T11598] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3047.656873][T11598] device bond211 entered promiscuous mode [ 3047.668664][T11609] tipc: Not found cipher: "gcm("! [ 3047.695994][T11610] bond211: (slave bridge321): making interface the new active one 01:23:23 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) r2 = dup(r1) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000000)=0x46, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0xc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3047.712248][T11610] device bridge321 entered promiscuous mode [ 3047.748264][T11610] bond211: (slave bridge321): Enslaving as an active interface with an up link 01:23:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000fbffffff000000400006803c00040067636d28"], 0x54}}, 0x0) [ 3047.834340][T11657] tipc: Not found cipher: "gcm("! [ 3047.839475][T11598] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3047.868235][T11610] bond211: (slave bridge322): Enslaving as a backup interface with an up link 01:23:23 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r6 = openat(r5, &(0x7f0000000700)='./file0\x00', 0x121440, 0x112) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="01000f000000bf0a10041b10c5a6"], 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r6, &(0x7f0000000a80)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000780)={0x188, r8, 0x2, 0x70bd29, 0x25dfdc01, {}, [@TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK={0x4c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbfa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa5}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf7e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffeff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r9 = dup(0xffffffffffffffff) ioctl$BLKZEROOUT(r9, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000600)={0x9, 0x2, 0x4, 0x70000, 0x2, {}, {0x4, 0xc, 0x3, 0x3d, 0x2, 0x7, "5c3e2903"}, 0x6, 0x2, @fd, 0x4, 0x0, r9}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb90, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x10]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3048.046213][T11682] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3048.141787][T11682] device bond212 entered promiscuous mode [ 3048.168290][T11687] bond212: (slave bridge323): making interface the new active one [ 3048.176468][T11687] device bridge323 entered promiscuous mode [ 3048.183740][T11687] bond212: (slave bridge323): Enslaving as an active interface with an up link [ 3048.198560][T11682] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3048.220076][T11687] bond212: (slave bridge324): Enslaving as a backup interface with an up link 01:23:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb91, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3048.313058][T11730] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3048.392005][T11730] device bond213 entered promiscuous mode [ 3048.432083][T11752] bond213: (slave bridge325): making interface the new active one [ 3048.450181][T11752] device bridge325 entered promiscuous mode [ 3048.465566][T11752] bond213: (slave bridge325): Enslaving as an active interface with an up link [ 3048.498655][T11730] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3048.546756][T11752] bond213: (slave bridge326): Enslaving as a backup interface with an up link 01:23:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x12]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@RTM_NEWNSID={0x64, 0x58, 0x20, 0x70bd26, 0x25dfdbff, {}, [@NETNSA_NSID={0x8, 0x1, 0x4}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x4}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8}]}, 0x64}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}]}}}, @IFLA_MASTER={0x8, 0xa, r4}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) dup(r6) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000040)={@initdev, 0x0}, &(0x7f0000000080)=0x14) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="5800000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000400000280012800b000100697036746e6c000018000280140002002001000000000000000000000000000008000a00", @ANYRES32=r10, @ANYBLOB="08001e00e2ff00001d512bbb777e137e0bc6161e3b13aba4c2d2594b48c7b249e525053413059581786b2db6979aef0000"], 0x58}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="080027bd7000fedbdf2507000000300001800800030001000000140002007866726d30000000000000000000000008000300d40201eb08000100", @ANYRES32=0x0, @ANYBLOB="18000180140002006272696467655f736c6176655f3000004000018008000300030000000800010039ad8980f07398a0c3e64a624457b88432da19a399c27a2294ebf5a502043c065acef09b4ede6dd7adf6b03c464dfbbb0707df00b9269273ccd0b5736a7532287747031faeedd7f6af72413e", @ANYRES32=r4, @ANYBLOB="080003000200000008000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="14000200e903384d69705f76746930000000000000000000"], 0x9c}, 0x1, 0x0, 0x0, 0x4011}, 0x2000000d) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0000000017e000636d28"], 0x54}}, 0x0) 01:23:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb92, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:26 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000000)={0x1000, 0x0, 0x10000, 0xa97}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000140)={0x0, r3, 0x0, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x7, r0, 0x8000000000000, 0x8001) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3050.655504][T11774] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3050.732866][T11774] device bond214 entered promiscuous mode [ 3050.754915][T11791] bond214: (slave bridge327): making interface the new active one [ 3050.765002][T11791] device bridge327 entered promiscuous mode [ 3050.772700][T11791] bond214: (slave bridge327): Enslaving as an active interface with an up link 01:23:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0xfc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3050.796122][T11774] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000b793c73b92829ddacd0fddeaba5238ef3f12acabf5cff10b32c788b9c4a412dcd7afdd2740a1c7f62b61b6a6ed7c66d7c18a89306d32d752239c91db97fa5732342aa050c225d6231dd67378ed0e2e2c904730044e653e5ab4736d42469c0c4364873eb7a2989f167a8dad90a0", @ANYRES16=r4, @ANYBLOB="010000000000000000000f000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f0000000480)={0x11b4, r4, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x100c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x1004, 0x3, "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"}]}, @TIPC_NLA_NODE={0xd0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xca, 0x3, "10759160a6e94d5ea1b206a24db82ff2e420fcded164bb7f3c21f324aa703f74a57cdd22ad6034782e97347ec9d755a4a11adfd6dc52be6efa7e99a14b81d8ad645112edd0afba705e464fa6c6e263cb805a63254a641b9a60b1a5ff6c126745ab16944edc37d19c68c9a5a80995dd35aa9afa6b559bb3ef48a951f6e6118a708229910ee01b56c02279fdb7bc03fbed11b0190dd8cad479481ab5678676a1289c78d2d0855e15fa7d6f1ac70e321d6ae4e2857919046450b9c6ec077bf4e5cea1cc303f80af"}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x401}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfe}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x401}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x10c}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x401}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA={0x40, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd1ec}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}]}, @TIPC_NLA_NET={0x38, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20000000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}]}]}, 0x11b4}, 0x1, 0x0, 0x0, 0x5}, 0xc051) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="54000056a586b16a2c916b068d8b00832638", @ANYRES16=r5, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:26 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6_vti0\x00', r5, 0x0, 0x8, 0xf8, 0x3, 0x16, @dev={0xfe, 0x80, [], 0x3b}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7800, 0x8000, 0x7fffffff, 0x4}}) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 3050.855644][T11791] bond214: (slave bridge328): Enslaving as a backup interface with an up link 01:23:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb93, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRESDEC=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}, 0x1, 0x0, 0x0, 0x24048801}, 0x0) 01:23:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:27 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) r2 = dup(r1) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) dup(r6) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000640)={0xb8, 0x5, 0x6, {0x1f, 0x8}, 0x7ca4, 0x5}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000600)={@empty, 0xcefc, 0x1, 0x2, 0xd, 0x7, 0x1}, 0x20) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB='\x00'/14], 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x8, 0x72bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20040060}, 0x800) r7 = socket(0x10, 0x2, 0x0) sendto(r7, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r7, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 3051.001478][T11861] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3051.074982][T11861] device bond215 entered promiscuous mode 01:23:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000080)={'HL\x00'}, &(0x7f0000000100)=0x1e) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001b000000400006803c00140067636d28c96183a92540ee3c53203232c81e38bdbb14abbbe9659d0c344ff0ab420d9abca5e8fee4fd9b0102de5a7a624e5005c4b99ac6b0bfcba16beb809ed0bda79a52305ccc3da0f62b50db4539af1f851f63f107639d"], 0x54}}, 0x0) [ 3051.123635][T11864] bond215: (slave bridge329): making interface the new active one [ 3051.145024][T11864] device bridge329 entered promiscuous mode [ 3051.156615][T11864] bond215: (slave bridge329): Enslaving as an active interface with an up link 01:23:27 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000b40), &(0x7f0000000b80)=0x8) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x20100, 0x142, 0x10}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/btrfs-control\x00', 0x1, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14, r8, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_NET_GET(r6, &(0x7f0000000b00)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000700)={0x38c, r8, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x1bc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "01ea6b14686bd79f05f54664e4ed8fb62e851d4fb8f8cf3c1bb3e58a7261bfcde89cf4"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "34e3caeb36d92fc27b221b2d03a4790e2c17dad82885b9ce75bc21fc2b1cf8741424c3"}}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "2cc424f4d6385ff1bedf7570f1b6c43a06cf3bad83cc0318636e"}}, @TIPC_NLA_NODE_ID={0xb8, 0x3, "4ed8cb85d4e3bbdaa58345eeba84654acfb1f9edb56c68be6ad9da7ce661b0c52c05f5d2e8a4d0b373ce05704f1ff3a3f761eeee63e7e8636ec42616c7722662b53ec1d993b205be40bfff75461d12257691f949889ab7fabcf05a920da86cf542144d8e56fcf58cc59dc931458a8c8dd0f4242f05e008dd496348639f29d083d567300587e67d00a708635a0239b5fa7a18f105296c13d5834829ba37d1a76dccaa6fcd8428e1ea3d12cf383e42a44569695fe5"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0x78, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x89ad}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x41b}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x81}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6e0}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_MEDIA={0x2c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6c8a}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x27400000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}]}, @TIPC_NLA_NODE={0x5c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x47, 0x4, {'gcm(aes)\x00', 0x1f, "3e6d75bcf5e98606e7040ef6ed3144c9a4a2e42b59ecafc001373395ed77d4"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x38c}, 0x1, 0x0, 0x0, 0x40000004}, 0x4804) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f0000000300)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/72, 0x48}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000000)=""/38, 0x26}], 0x8, &(0x7f0000000600)=""/206, 0xce}, 0x20000}], 0x1, 0x6, &(0x7f00000000c0)) 01:23:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) sendmsg$NFNL_MSG_CTHELPER_DEL(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, 0x2, 0x9, 0x201, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1a}, @NFCTH_STATUS={0x8}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_TUPLE={0x38, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6}]}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0xf7b}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x4f}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1a}]}, 0x7c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) [ 3051.192421][T11861] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3051.224228][T11864] bond215: (slave bridge330): Enslaving as a backup interface with an up link [ 3051.318605][T11920] tipc: Not found cipher: "gcm("! [ 3051.349564][T11925] tipc: Not found cipher: "gcm("! 01:23:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x2]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb94, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="af6c3ef2a075f9514026c73851163accc54ef68f9a8206a3377fb926b49487e378c53ac20e28a34069e522ebe45924433f87b362d92096b6899c2ef3f0e48ce6a68808e780432834126d898a1b5b7404f778bd7e591e17eda952bd787998318581dc38d4aec05831131e4d995646ec3bd4073466bc0dca1cc26ffa0384e3", @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x12]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3053.757192][T11948] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r4 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="fce93b033f7ca9337f9a11acfaf0df96f7a4c7b7ddf511", @ANYRESOCT=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESOCT, @ANYRESOCT=r4, @ANYRES32=r3], 0x54}}, 0x14) [ 3053.810310][T11948] device bond216 entered promiscuous mode [ 3053.855446][T11977] bond216: (slave bridge331): making interface the new active one [ 3053.866074][T11977] device bridge331 entered promiscuous mode [ 3053.875480][T11977] bond216: (slave bridge331): Enslaving as an active interface with an up link [ 3053.891789][T11948] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x10]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3053.913200][T11977] bond216: (slave bridge332): Enslaving as a backup interface with an up link 01:23:29 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200600, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000180)={0x40, 0x3, &(0x7f0000000040)=[0x1, 0x100, 0xfffd], &(0x7f00000003c0)=[0x4, 0x4, 0x5, 0xc1, 0x1000, 0x800], &(0x7f0000000100)=[0x3f, 0x3, 0x1, 0x401, 0x9], &(0x7f0000000140)=[0x3ff, 0x400]}) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x800, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="d7fdffffffffffffff0ced3996ec", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r7, @in={{0x2, 0x0, @empty}}, 0x3ff}, 0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000300)={r7, 0x48, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x4e17, @empty, 0x9}, @in6={0xa, 0x4e21, 0x7, @mcast2, 0x81}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000340)=0x10) sendmsg$TIPC_NL_KEY_SET(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[], 0x54}, 0x1, 0x0, 0x0, 0x20004081}, 0x0) 01:23:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb95, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x5]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3054.082131][T12019] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3054.118370][T12019] device bond217 entered promiscuous mode [ 3054.158691][T12054] bond217: (slave bridge333): making interface the new active one [ 3054.168857][T12054] device bridge333 entered promiscuous mode [ 3054.182458][T12054] bond217: (slave bridge333): Enslaving as an active interface with an up link 01:23:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x4]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3054.207581][T12054] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x2]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb96, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3054.298775][T12054] device bond218 entered promiscuous mode 01:23:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x5]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3054.365134][T12111] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3054.395777][T12111] device bond219 entered promiscuous mode [ 3054.439663][T12111] bond219: (slave bridge335): making interface the new active one [ 3054.454041][T12111] device bridge335 entered promiscuous mode [ 3054.461377][T12111] bond219: (slave bridge335): Enslaving as an active interface with an up link [ 3054.483351][T12111] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3054.520314][T12152] bond219: (slave bridge336): Enslaving as a backup interface with an up link 01:23:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) ioctl$DRM_IOCTL_MODE_GETFB(r2, 0xc01c64ad, &(0x7f0000000000)={0x99, 0x0, 0x6, 0xe000000, 0x1f, 0x2, 0x6}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:32 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r6 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x8000, 0x0) ioctl$CHAR_RAW_FRASET(r9, 0x1264, &(0x7f0000000600)=0x3f) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000200)={r8, @in={{0x2, 0x0, @empty}}, 0x3ff}, 0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000000)={0xc6c, 0x3, 0xb, 0x7479, 0xffffffff, 0x7, 0x7, 0x3, r8}, &(0x7f00000001c0)=0x20) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0xa, &(0x7f0000000140)=[{0x0, 0x0, 0x2, 0x4}, {0x9, 0x40, 0x7f, 0x80000000}, {0x3, 0x3, 0x96, 0x9}, {0x8, 0x90, 0x5, 0x1f}, {0x3a, 0x75, 0x40, 0x3ff}, {0xd5a, 0x5c, 0x0, 0x4}, {0x8, 0x2, 0x0, 0x10001}, {0x0, 0x6, 0x2, 0x8}, {0x0, 0x3, 0xbd, 0xe2}, {0xfff7, 0x3, 0x1, 0x800}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xac8}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xc1}], 0x5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 01:23:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb97, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x6]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYRESHEX, @ANYRES64=r3], 0x54}, 0x1, 0x0, 0x0, 0x40803}, 0x854) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) dup(r5) getsockopt$inet_dccp_buf(r5, 0x21, 0xc, &(0x7f0000000100)=""/78, &(0x7f0000000180)=0x4e) [ 3056.982965][T12174] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:33 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) sendmsg$TIPC_NL_KEY_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r0, @ANYRES16=r3], 0x54}, 0x1, 0x0, 0x0, 0x20000084}, 0x0) [ 3057.050908][T12174] device bond220 entered promiscuous mode [ 3057.078846][T12195] bond220: (slave bridge337): making interface the new active one [ 3057.087858][T12195] device bridge337 entered promiscuous mode [ 3057.096014][T12195] bond220: (slave bridge337): Enslaving as an active interface with an up link [ 3057.111689][T12174] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3057.135102][T12195] bond220: (slave bridge338): Enslaving as a backup interface with an up link 01:23:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb98, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(0xffffffffffffffff) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r4, 0xc0884113, &(0x7f0000000840)={0x1, 0x1, 0x6, 0xbfc9, 0x9284, 0x7, 0x8, 0x0, 0x9, 0x9, 0x0, 0x4}) dup(r3) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) r7 = dup(r6) socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_COALESCE_SET(r6, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="01002abd7000ffdbdf2508000f000400000008000300c62b910208001600ff0f0000000000000000000027feb0e0e0131dbedef41d1a4558823729edd48b2be90ad0d32cea7e0b037a73b8b68a44e6112344276a26a6eb5853c7297833f77045ad59dfd251464e02eeb2e83026cdc2bb2545109fdf01b8b5602094e260e7d7cf125cecf758b34cd4d2ce6e16d25b9c2c7a2d19b8e4bc3db399cdb806cb4152758280f47e1a06b3e08d8d712a84462569798aec6784573fb367"], 0x34}, 0x1, 0x0, 0x0, 0x8815}, 0x10008084) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x121400, 0x0) recvmsg(r10, &(0x7f0000000800)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000700)=[{&(0x7f0000000500)=""/141, 0x8d}, {&(0x7f00000005c0)=""/179, 0xb3}, {&(0x7f00000001c0)=""/14, 0xe}, {&(0x7f0000000680)=""/114, 0x72}], 0x4, &(0x7f0000000740)=""/134, 0x86}, 0x20) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3800c7623391a957d4ae0000", @ANYRES16=r9, @ANYBLOB="000427bd7000fbdbdf2508000000050004000300000005000400e5000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x80) ioctl$VHOST_SET_VRING_ENDIAN(r7, 0x4008af13, &(0x7f0000000280)) 01:23:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3057.279560][T12234] tipc: Not found cipher: "gcm("! [ 3057.285432][T12235] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3057.337345][T12235] device bond221 entered promiscuous mode [ 3057.361801][T12240] tipc: Not found cipher: "gcm("! 01:23:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[], 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x0) [ 3057.396083][T12243] bond221: (slave bridge339): making interface the new active one [ 3057.412627][T12243] device bridge339 entered promiscuous mode [ 3057.419211][T12243] bond221: (slave bridge339): Enslaving as an active interface with an up link [ 3057.435690][T12235] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3057.458951][T12243] bond221: (slave bridge340): Enslaving as a backup interface with an up link 01:23:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x2) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb99, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="54000000ec8476076e2b8d00eae8b2c6d350042fac8bd6d10b68fd8e3d5f1d316030bcb57bc412ef8f80e3b4a9836f2891ec6bcb7dd3fff42a483201400f89643d9e54765300394df626ee005c4f9f0331f3659a5602018f1c6804d2c7bdd9facaffee14001c4a284533a499", @ANYRES16=r1, @ANYBLOB="01000700000000000000170000d5400006803c80040067636d28"], 0x54}}, 0x0) [ 3059.822540][T12303] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3059.857774][T12303] device bond222 entered promiscuous mode [ 3059.877083][T12303] bond222: (slave bridge341): making interface the new active one [ 3059.885143][T12303] device bridge341 entered promiscuous mode [ 3059.893391][T12303] bond222: (slave bridge341): Enslaving as an active interface with an up link [ 3059.908379][T12303] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3059.927301][T12345] bond222: (slave bridge342): Enslaving as a backup interface with an up link 01:23:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x9]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20f00, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0x6, &(0x7f0000000240)={&(0x7f0000000080)={0x3b, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CV4DOI={0xfffffffffffffe78, 0x4, 0x1}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}]}, 0x30}}, 0x4040) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="7bf1c5a30adc8c83ca76e0102bcc46c2357654eaeba488ce57611b082dacf8f482379a03308c7500b683f7abccf638622121cd56ddeb5c0e33db77571448e8026cb9b028c5ce9e7e75fe62211d50db6a62cc517f47bfa786cfc0d53ea41b21eab341736a7b01d1d1105bfa420d1737f0b0fc5e23db75c8efbe1558d4cee2b58ae73b773122e880516c770c6ef1a91c7bb28d4487b4222bc9c0", @ANYRES16=r3, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb9a, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3060.040750][T12356] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3060.135065][T12356] device bond223 entered promiscuous mode 01:23:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r3, 0x40084149, &(0x7f00000004c0)=0x4b66) r4 = dup(r2) dup(r4) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB="407d808b683a00d22b", @ANYRES16=r6, @ANYBLOB="040027bd700000000000020000000c00060002000000000000000c00020002000000000000000c00020004000000000000", @ANYRESOCT, @ANYRESHEX, @ANYRESDEC, @ANYRES64], 0x38}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r6, 0x1, 0x7, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8c1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}}, 0x1) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x4312c2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000540)={0x3, {0x0, 0x7fffffff, 0xfffffffb, 0x4000000}, {0x1, 0x7, 0x5e5, 0x98}, {0x400}}) r8 = dup(r7) dup(r8) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="14000000", @ANYRES16=r10, @ANYBLOB="010000000000000000000d0000007264aaa4ff448fc61a1d21722d1cb0fa816f59664714dbcea336548bba6ea0d8dc0f2279dc3bce94e112cbd0a24eca3e1a3d461af48b974f70e416463e521ee82261411b5f295ad02323ecb0f5658740a84dc0a5d01b6fbcfd4288f8757b381959"], 0x14}}, 0x0) sendmsg$TIPC_NL_PUBL_GET(r8, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x70, r10, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x5c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x101}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xa9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x67c21cb1292f6dc7}, 0x0) [ 3060.186976][T12388] bond223: (slave bridge343): making interface the new active one 01:23:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xa]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3060.245197][T12388] device bridge343 entered promiscuous mode [ 3060.260498][T12388] bond223: (slave bridge343): Enslaving as an active interface with an up link 01:23:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3060.313969][T12408] tipc: Not found cipher: "gcm("! [ 3060.363543][T12388] bond223: (slave bridge344): Enslaving as a backup interface with an up link [ 3060.374817][T12356] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3060.393514][T12408] tipc: Not found cipher: "gcm("! 01:23:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0xe) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x600001, 0x200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec5316", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb9b, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3062.844293][T12435] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3062.888618][T12435] device bond224 entered promiscuous mode [ 3062.916737][T12474] bond224: (slave bridge345): making interface the new active one [ 3062.925676][T12474] device bridge345 entered promiscuous mode [ 3062.933440][T12474] bond224: (slave bridge345): Enslaving as an active interface with an up link [ 3062.955557][T12474] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x1) getpeername$inet(r1, &(0x7f0000000000)={0x2, 0x0, @private}, &(0x7f0000000080)=0x10) 01:23:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4410000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20048880}, 0x80) 01:23:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb9c, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3063.167716][T12494] tipc: Not found cipher: "gcm("! [ 3063.173024][T12495] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3063.222378][T12495] device bond225 entered promiscuous mode [ 3063.246589][T12503] bond225: (slave bridge347): making interface the new active one [ 3063.254984][T12503] device bridge347 entered promiscuous mode [ 3063.261693][T12503] bond225: (slave bridge347): Enslaving as an active interface with an up link [ 3063.271557][T12501] tipc: Not found cipher: "gcm("! 01:23:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) r4 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) fsetxattr$system_posix_acl(r4, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES64, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYBLOB, @ANYRESHEX, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="6ea1fab76319511550b5eb12cc136238427ef33b6044a5e53922f8a4e8f34b70a011c65d3605a831787a7f902a8ff567ec5f3550080832c223132613a017261134339b0035cd5d27bc809326223f343b3fb807dde3f578129bf304bcc7dabc5dd962d14c7419a82a4e680e7f4604a254c1abe02c86a2b0", @ANYRES32, @ANYRESHEX=r5, @ANYRES32=r6, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="d5300000", @ANYRES32], 0x8c, 0x0) setgid(r6) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000080)={r0}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r7 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r7, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r8 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r8, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r7, @ANYRES16=r8], 0x54}}, 0x8000) connect$rds(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @remote}, 0x10) 01:23:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x10]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3063.334075][T12503] bond225: (slave bridge348): Enslaving as a backup interface with an up link 01:23:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb9d, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3063.378315][T12495] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3063.450193][T12559] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3063.482580][T12559] device bond226 entered promiscuous mode [ 3063.503228][T12559] bond226: (slave bridge349): making interface the new active one [ 3063.511573][T12559] device bridge349 entered promiscuous mode [ 3063.518359][T12559] bond226: (slave bridge349): Enslaving as an active interface with an up link 01:23:39 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) socketpair(0x18, 0x4, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000080)={r1}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r5 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r7 = dup(r6) dup(r7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r7, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0x4, @private1, 0x2}, {0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10001}, 0x7f, [0x3, 0x101, 0x2, 0xffffffff, 0x3, 0x8, 0x9, 0x20400000]}, 0x5c) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001040)=ANY=[@ANYBLOB="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", @ANYRESOCT, @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x20008040}, 0x4840) 01:23:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x12]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3063.549939][T12559] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3063.576551][T12599] bond226: (slave bridge350): Enslaving as a backup interface with an up link 01:23:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb9e, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x42000000) modify_ldt$write2(0x11, &(0x7f0000000040)={0x81, 0x100000, 0x1000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1}, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) [ 3065.865380][T12615] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3065.909827][T12615] device bond227 entered promiscuous mode [ 3065.937988][T12618] tipc: Not found cipher: "gcm("! [ 3065.959602][T12654] bond227: (slave bridge351): making interface the new active one [ 3065.967549][T12654] device bridge351 entered promiscuous mode [ 3065.976363][T12654] bond227: (slave bridge351): Enslaving as an active interface with an up link [ 3066.001611][T12658] tipc: Not found cipher: "gcm("! [ 3066.006786][T12615] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3066.033679][T12654] bond227: (slave bridge352): Enslaving as a backup interface with an up link 01:23:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x25) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xfc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fb9f, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getpid() r2 = dup(0xffffffffffffffff) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r2, 0x80184132, &(0x7f0000000b00)) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) clone3(&(0x7f0000000380)={0x41104200, &(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f0000000100), {0x39}, &(0x7f0000000140)=""/195, 0xc3, &(0x7f0000000240)=""/238, &(0x7f0000000340)=[r0, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff], 0x5, {r4}}, 0x58) process_vm_writev(r5, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/183, 0xb7}, {&(0x7f00000005c0)=""/218, 0xda}], 0x2, &(0x7f0000000a80)=[{&(0x7f00000006c0)=""/182, 0xb6}, {&(0x7f0000000780)=""/5, 0x5}, {&(0x7f00000007c0)=""/173, 0xad}, {&(0x7f0000000880)=""/161, 0xa1}, {&(0x7f0000000940)=""/106, 0x6a}, {&(0x7f00000009c0)=""/188, 0xbc}], 0x6, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x11, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000b40)="73269679fe14f0aa3c8eb9ea1efd1951cd37ebfd9f7a81625807eebdd3d3aa2e8306d11ef875b6061f89a0348bb9777e4da2") ptrace$cont(0x20, r0, 0x0, 0x21) chmod(&(0x7f0000000000)='./file0\x00', 0x1a8) [ 3066.164325][T12670] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3066.239869][T12683] IPVS: ftp: loaded support on port[0] = 21 [ 3066.246345][T12670] device bond228 entered promiscuous mode [ 3066.288801][T12671] tipc: Not found cipher: "gcm("! [ 3066.304713][T12682] bond228: (slave bridge353): making interface the new active one [ 3066.313623][T12682] device bridge353 entered promiscuous mode [ 3066.320280][T12682] bond228: (slave bridge353): Enslaving as an active interface with an up link 01:23:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3066.356454][T12726] tipc: Not found cipher: "gcm("! [ 3066.361897][T12670] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC=r2], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x8200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x2, 0x8, 0x101, 0x0, 0x0, {0x7, 0x0, 0x7}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_COOKIE_WAIT={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x40051) 01:23:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fba0, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3066.398819][T12682] bond228: (slave bridge354): Enslaving as a backup interface with an up link [ 3066.499492][T12740] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3066.553447][T12740] device bond229 entered promiscuous mode [ 3066.624980][T12739] tipc: Not found cipher: "gcm(00000000000000000004"! [ 3066.648478][T12745] bond229: (slave bridge355): making interface the new active one [ 3066.656628][T12745] device bridge355 entered promiscuous mode [ 3066.664578][T12745] bond229: (slave bridge355): Enslaving as an active interface with an up link [ 3066.690287][T12785] tipc: Not found cipher: "gcm(00000000000000000004"! [ 3066.713275][T12740] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) dup(r6) r7 = open(&(0x7f0000000100)='./file1\x00', 0x164142, 0x0) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)={0x160, r8, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x94, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2f82ded3}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3fd5cc0b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x21bc68c2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x88}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x38}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c44d66a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2c9af2f2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ed99594}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4500228a}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x4c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2a6f16ba}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1e98}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4135}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ba1a323}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xda79}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1da6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf50}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x3c, 0x8, 0x0, 0x1, [{0x4}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4880ad7c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6dde6b18}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaa}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x54dcba93}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x160}, 0x1, 0x0, 0x0, 0x8800}, 0x4000811) sendmsg$NLBL_CIPSOV4_C_ADD(r6, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r8, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x8126fca68ea27e26}]}, 0x24}, 0x1, 0x0, 0x0, 0x2810}, 0x8800) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) getsockname$l2tp(r4, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x10) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="54000000685563f209aba5dc50639495d1401d15bb7fc5649f945605ae0fd4800bec2536aae46576071d3417647e8ca41023e19eb53297b8daf80f893c3f2cc715b4", @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fba1, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x400, 0x0) ftruncate(r1, 0x2) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000080)=0x4) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) dup(r5) ioctl$VT_RESIZE(r5, 0x5609, &(0x7f0000000040)={0x1000, 0x8, 0x7}) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@rc, &(0x7f0000000080)=0x80, 0x180800) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000380)={0x0, 0xfffffffc, &(0x7f0000000340)={&(0x7f0000000280)={0x24, r4, 0xc15, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x7f}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x8, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0xc0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x101200, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYRES64, @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}, 0x1, 0x0, 0x0, 0x44800}, 0x0) 01:23:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3069.210307][T12811] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3069.267611][T12811] device bond230 entered promiscuous mode [ 3069.283724][T12838] bond230: (slave bridge357): making interface the new active one 01:23:45 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x80000) ioctl$LOOP_SET_FD(r4, 0x4c00, r1) r5 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvme-fabrics\x00', 0x240, 0x0) sendmsg$TIPC_NL_KEY_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="5411e208", @ANYRESHEX=r5, @ANYBLOB="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"], 0x54}}, 0x0) 01:23:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3069.325896][T12838] device bridge357 entered promiscuous mode [ 3069.343203][T12838] bond230: (slave bridge357): Enslaving as an active interface with an up link [ 3069.356636][T12811] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fba2, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3069.399214][T12838] bond230: (slave bridge358): Enslaving as a backup interface with an up link 01:23:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fallocate(r1, 0x15, 0x200, 0xffff) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r4, 0x89f4, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', r5, 0x29, 0x8, 0x6, 0xfff, 0x6c, @private1={0xfc, 0x1, [], 0x1}, @loopback, 0x7800, 0x40, 0xffffffce}}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="0000000054ebb64465375dbf2338f4c7fc99c9cdd1e6e4", @ANYRES16, @ANYBLOB="0100000000000000000017000000400006803c00040067636d2862b0fdd5e5d6a626cd578d7a4553693f59a351ffffffff00000000ae9fcb437482e30600000006595878be98a7b45e9967a55e399c2ef9900ad7266d8170dee60657b8ec86ee7d0db763daece3068538912aca1698dea78e1f6a5afd3a13c88fde45bec340e58b7434e9552372857fcc0e77c6ce0ebe701047ce71665e27fdbf22385ef452bee0924ce472b3e076caf747ea11e49078df856bad5326bac92bb738bbe84600a9faa77d5e1d5d91bd4096e14f23280b4a3b89bbc4d2a75a330027ff7b1d3fcc"], 0x54}}, 0x0) r6 = dup(0xffffffffffffffff) dup(r6) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0xfffffffffffffe64, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000280)={'team0\x00', r9}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000003c0)={'ip6gre0\x00', &(0x7f0000000340)={'syztnl2\x00', r10, 0x29, 0xc0, 0x0, 0xf0e, 0x7c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1, 0x8, 0x10, 0x100, 0x3dc}}) [ 3069.487783][T12878] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3069.526730][T12878] device bond231 entered promiscuous mode [ 3069.553767][T12914] bond231: (slave bridge359): making interface the new active one [ 3069.563065][T12914] device bridge359 entered promiscuous mode [ 3069.571055][T12914] bond231: (slave bridge359): Enslaving as an active interface with an up link [ 3069.581216][T12913] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3069.603715][T12878] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3069.625187][T12914] bond231: (slave bridge360): Enslaving as a backup interface with an up link [ 3069.639626][T12917] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. 01:23:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fba3, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3071.947847][T12927] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3071.987757][T12927] device bond232 entered promiscuous mode [ 3072.014837][T12964] bond232: (slave bridge361): making interface the new active one [ 3072.023376][T12964] device bridge361 entered promiscuous mode [ 3072.031073][T12964] bond232: (slave bridge361): Enslaving as an active interface with an up link [ 3072.044326][T12927] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3072.064370][T12964] bond232: (slave bridge362): Enslaving as a backup interface with an up link 01:23:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:48 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x3, 0x8821ff}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'broute\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0100000000000000000017000000400006803c00040071d8d3d2"], 0x54}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="000000000000002e9e5198845ef3a71c23740fbdb501a6aa87c491f006f4ccbe7224135b24186c79ac16006434fd8be1227fae19d4b194af7e39237c51c90e02150a5546902731acdf17f3d7973de944f4f6e0123c6cf977f3a71caf5b7a469f04ed6346ec9317590acac3a5e49358014cef11169512792933f29c67e079d421cfdd13d222db31b20a5c595ff0670fa298b0748cad22cfe3441a5c474fe0c24071a2496093b4ea9f0309fa687dba341f237c2aa8984aa32b3ad4d985142a1e4f1137c8ff29e8a451bce9cff383f8d2efddffe4b4ccbfbc407c81bd1f6a8b9b7f1ace1a75b710c1b3fb50c1a661914edb7b23a791310e3a1ab58a5a0aa9eda50d718d8a6c3d9ca84d6241c972eddfce94", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000050002000a000000"], 0x1c}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5e0000da", @ANYRES16=r10, @ANYBLOB="010000000000000000000f000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000780)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x48041}, 0x40000) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16=r8, @ANYBLOB="010029bd7000ffdbdf250100000004000500050004000200000014000900fe800000000000000000000000000033140007002001000000000000000000000000000204000500060001004e2400000500040000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) 01:23:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fba4, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) msgget$private(0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{0x1, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}) msgsnd(0x0, &(0x7f00000002c0)={0x0, "f9b0fed42086db8bb71e336837f3e2ac8cad143885fdb627f3d95bc3c25400c6262401f3c7ea2beec017485753d2be9403b923c8d3450600000000000000a4b285c56c92a233d279c3670f1a703dbc17232fc320bae32c0bb8ed534422ccc6f9efbdffcb8cc2e84501d854d59d7ba247d222b513e8220cb6989e54e415044c411867a226fffab7d2895fe6d87dffe528ff2ea8fb084fc1b594a9"}, 0xa2, 0x800) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000280)={0x3, 0x2}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r3, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000050}, 0x24000041) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x21) [ 3072.372423][T12977] tipc: Not found cipher: "qØÓÒ"! [ 3072.377528][T12980] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = dup(0xffffffffffffffff) dup(r2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r6 = dup(r5) dup(r6) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r8 = dup(r7) r9 = dup(r8) ioctl$BLKZEROOUT(r9, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x408000, 0x0) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r11 = dup(r10) dup(r11) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x74, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x100000001}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1e}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x100000001}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x74}, 0x1, 0x0, 0x0, 0x8008805}, 0x0) [ 3072.471751][T12980] device bond233 entered promiscuous mode [ 3072.507967][T12990] bond233: (slave bridge363): making interface the new active one [ 3072.516012][T12990] device bridge363 entered promiscuous mode [ 3072.528171][T12990] bond233: (slave bridge363): Enslaving as an active interface with an up link 01:23:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fba5, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3072.573820][T13041] tipc: Not found cipher: "gcm("! [ 3072.583046][T12980] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3072.607837][T12990] bond233: (slave bridge364): Enslaving as a backup interface with an up link [ 3072.671331][T13051] tipc: Not found cipher: "gcm("! [ 3072.712922][T13061] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3072.751407][T13061] device bond234 entered promiscuous mode [ 3072.769194][T13061] bond234: (slave bridge365): making interface the new active one [ 3072.777018][T13061] device bridge365 entered promiscuous mode [ 3072.786459][T13061] bond234: (slave bridge365): Enslaving as an active interface with an up link [ 3072.811547][T13061] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3072.830783][T13097] bond234: (slave bridge366): Enslaving as a backup interface with an up link 01:23:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:50 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28e815e229eed88554000000", @ANYRESDEC=r0, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESHEX=r0], 0x54}}, 0x1) 01:23:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fba6, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000170000c1a42ed9803c00040067636d28"], 0x54}}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) r6 = dup(r5) ioctl$BLKZEROOUT(r6, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r6, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)={0x2a4, r7, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x7c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc06f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xda1}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x83e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_BEARER={0xb0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x9, 0x8, @loopback, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x4, @loopback, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x11, 0x1, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x45, 0x4, {'gcm(aes)\x00', 0x1d, "eb21db93bb38b190efa52a9245336e11136f2ca1e5eacc7e0144e4a8e8"}}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0xf4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ID={0xa0, 0x3, "346c69244240bbda903c645fcc4d65ddfb9b381809fe4be3cc52aa15155e330b6e9a64090c791c1e9d1235c533b9bd9c1ab2ea220a9b21311ee452d287b3a5121a4ce02ff12d40251261ab32dbb734110cc485cbefd2f4e6bfb1fcbd2b9719f538b4c22b4b7b04e1a4f99c29cfa52697268b57ff4311630c80d72f7d6cba83a50778ad32d6600a41ecd453dd33aa4eb3732131472f585352d97d2644"}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "7e54e883ec2717cadf4a88e7cba1df5aac8b8e3e663be1b9275da4b28e40"}}]}, @TIPC_NLA_NET={0x20, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff5946}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}]}, 0x2a4}, 0x1, 0x0, 0x0, 0x10}, 0x200000c1) r8 = dup(r3) ioctl$BLKZEROOUT(r8, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$SOUND_MIXER_WRITE_VOLUME(r8, 0xc0044d01, &(0x7f0000000040)=0x35) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 01:23:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3075.291122][T13119] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3075.325716][T13119] device bond235 entered promiscuous mode 01:23:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) getsockopt$inet_mreqsrc(r2, 0x0, 0x26, &(0x7f0000000000)={@dev, @multicast1, @empty}, &(0x7f0000000040)=0xc) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) r3 = dup(0xffffffffffffffff) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c800001", @ANYRES16=r5, @ANYBLOB="1709000000000000000001000000050007000000000008000900000000001400200000000000000000000000ffffe000000108000a0000000000060002000100000014001f00"/86], 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, r5, 0x208, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc009}, 0x80) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3075.348643][T13119] bond235: (slave bridge367): making interface the new active one [ 3075.360714][T13157] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3075.375097][T13119] device bridge367 entered promiscuous mode [ 3075.404431][T13119] bond235: (slave bridge367): Enslaving as an active interface with an up link [ 3075.432107][T13119] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3075.436404][T13167] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 01:23:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fba7, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3075.452600][T13170] bond235: (slave bridge368): Enslaving as a backup interface with an up link 01:23:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3075.532285][T13183] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3075.600968][T13183] device bond236 entered promiscuous mode [ 3075.644517][T13184] tipc: Not found cipher: "gcm("! [ 3075.664021][T13193] bond236: (slave bridge369): making interface the new active one [ 3075.687489][T13193] device bridge369 entered promiscuous mode 01:23:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) ioprio_get$pid(0x1, r2) [ 3075.696106][T13193] bond236: (slave bridge369): Enslaving as an active interface with an up link [ 3075.717191][T13183] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3075.750985][T13234] tipc: Not found cipher: "gcm("! [ 3075.777461][T13193] bond236: (slave bridge370): Enslaving as a backup interface with an up link [ 3075.810215][T13234] tipc: Not found cipher: "gcm("! 01:23:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec5316", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fba8, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3078.030778][T13250] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3078.077074][T13250] device bond237 entered promiscuous mode [ 3078.093766][T13291] bond237: (slave bridge371): making interface the new active one [ 3078.101726][T13291] device bridge371 entered promiscuous mode [ 3078.108080][T13291] bond237: (slave bridge371): Enslaving as an active interface with an up link [ 3078.125126][T13291] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3078.178006][T13294] bond237: (slave bridge372): Enslaving as a backup interface with an up link 01:23:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000040)) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) dup(r5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @private=0xa010102}], 0x10) 01:23:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fba9, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) ioctl$TCSETXF(r2, 0x5434, &(0x7f0000000000)={0x10, 0x8, [0x8, 0xf1e4, 0x4, 0x9, 0x4], 0x4}) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3078.424752][T13304] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3078.494505][T13304] device bond238 entered promiscuous mode [ 3078.526594][T13303] tipc: Not found cipher: "gcm("! [ 3078.550964][T13328] bond238: (slave bridge373): making interface the new active one [ 3078.559876][T13328] device bridge373 entered promiscuous mode [ 3078.567329][T13328] bond238: (slave bridge373): Enslaving as an active interface with an up link [ 3078.589236][T13338] tipc: Not found cipher: "gcm("! 01:23:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3078.607543][T13304] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$VT_RELDISP(r4, 0x5605) 01:23:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbaa, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3078.675358][T13328] bond238: (slave bridge374): Enslaving as a backup interface with an up link [ 3078.755520][T13370] tipc: Not found cipher: "gcm("! [ 3078.764179][T13374] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3078.808024][T13374] device bond239 entered promiscuous mode [ 3078.823622][T13382] bond239: (slave bridge375): making interface the new active one [ 3078.834869][T13382] device bridge375 entered promiscuous mode [ 3078.842023][T13382] bond239: (slave bridge375): Enslaving as an active interface with an up link [ 3078.854299][T13376] tipc: Not found cipher: "gcm("! 01:23:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3078.881706][T13374] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3078.905080][T13382] bond239: (slave bridge376): Enslaving as a backup interface with an up link 01:23:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)={0x5d8, r3, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x44000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x14a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x441}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x81}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x46}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}]}, @TIPC_NLA_NODE={0x174, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "d7fb8f11c37de333eec235ec8d66f298a5e505e883c73bceee71f56a9ac11034ffb4"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ID={0x102, 0x3, "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"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x74f9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8001}]}, @TIPC_NLA_NODE={0x218, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xd0, 0x3, "7a1e9d14e8b2369092578985abd50affcaf8c78ee040bd66b2e2c03019a036a57cef71ed0cc8a7f626a45e2ae30875e3f35662e0103f49c19e328bb7eef450a17d03d33e2fa115b47c9a194dee20c35636830d49610814bca0e970e9736240d708aab7ae1c33c9cb346711d9d2f78803b980cbdde0d52c6c58f932526b1d0ff8e157c5c3fae766006309e882603c6f9774b37ecbf712e683c8108c1b101df1b82b8d59de45ac0e165bfa7edffe67348d5430fd81a081e4f2f24a00479db22cfb3ea07ee2b539c7c0594719ec"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xf6, 0x3, "c538c1f086359b24be55b3f3f6418f3581ae271b34275927af65be696404e397c4c24f30a5b79ddce64d56682076738238b9de6ff110d80079d351e218dfea81e5b253c90d21b9f747a5c3b8e35e4b659789fe103f7a1c5d2ce5e1bc8d92767a87088a61a0604d7ebf515f7a3ead009acbb2bd0c57cd5788bbd1ec928fb80b44fd222b1de9471acb534f537a42806fb30a8a35ffafbc81af59e8ace0682d3bb731415d38d41ac27365d5dfcf91f06b4ad99553aa342c8f9714e0c037ce12cde29e2d3f3423ef0d22948e9a953cd059127a6c798dc58fc9a554a3979cd1557877f6934fbd886b565d5ba89342e2e4e29e91d7"}, @TIPC_NLA_NODE_KEY={0x3f, 0x4, {'gcm(aes)\x00', 0x17, "fc01d9925b1f63217abc31797abdd0604e53031ac81001"}}, @TIPC_NLA_NODE_ID={0x7, 0x3, "8915fc"}]}, @TIPC_NLA_LINK={0x148, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x64}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x31}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4663}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcbc}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x101}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x97}]}]}, 0x5d8}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) dup(r5) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f0000000140)=""/225) r6 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r6, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x600301, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r8 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r8, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$FITHAW(r8, 0xc0045878) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:23:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbab, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3081.071271][T13436] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3081.124442][T13436] device bond240 entered promiscuous mode [ 3081.153590][T13437] tipc: Not found cipher: "gcm("! [ 3081.175808][T13470] bond240: (slave bridge377): making interface the new active one [ 3081.197683][T13470] device bridge377 entered promiscuous mode [ 3081.223512][T13470] bond240: (slave bridge377): Enslaving as an active interface with an up link [ 3081.236436][T13436] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3081.258273][T13470] bond240: (slave bridge378): Enslaving as a backup interface with an up link 01:23:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:23:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:23:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbac, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:23:57 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) r2 = dup(r1) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000400)={'veth1_to_bridge\x00', {0x2, 0x4e21, @local}}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x24, r4, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WIPHY_RTS_THRESHOLD={0x8}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xe4, r4, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY={0x3c, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_SEQ={0x11, 0x4, "be0b5db4ff3c571c9fd5e38d58"}, @NL80211_KEY_TYPE={0x8}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "d7e58cf180291f926ea0028b41"}, @NL80211_ATTR_KEY={0x44, 0x50, 0x0, 0x1, [@NL80211_KEY_SEQ={0x4}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_SEQ={0x14, 0x4, "f3d0889e147d452944635c3945b17679"}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "f0142e0198"}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x28, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x3991d73302b7336e}]}, 0xe4}, 0x1, 0x0, 0x0, 0x404c0c1}, 0x24000c81) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r9}, 0xc) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r10, @ANYBLOB="00022cbd700000028048000100000000000800010016000000080003004400000014000380080001000000dac40800010009000000"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x44) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self\x00', 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r9}, 0xc) sendmsg$TIPC_NL_KEY_SET(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='T\b\x00\x00', @ANYRES16=r8, @ANYBLOB="01000000d6d82606000000000017080000000000000000000000006d28"], 0x54}}, 0x0) 01:23:57 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=')^\x00', r1}, 0x30) r3 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(r2, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xfffffffffffffee6}], 0x4, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x21) r5 = dup(0xffffffffffffffff) r6 = dup(r5) ioctl$BLKZEROOUT(r6, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) setsockopt$inet6_dccp_buf(r6, 0x21, 0xc0, &(0x7f00000005c0)="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", 0x1000) [ 3081.503507][T13486] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="5404e5ff", @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) [ 3081.573416][T13486] device bond241 entered promiscuous mode [ 3081.597852][T13494] bond241: (slave bridge379): making interface the new active one 01:23:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) dup(0xffffffffffffffff) ioctl$SOUND_MIXER_READ_RECMASK(0xffffffffffffffff, 0x80044dfd, &(0x7f0000000000)) prctl$PR_SET_FP_MODE(0x2d, 0x3) r2 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@tipc=@name, &(0x7f0000000100)=0x80, 0x800) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000140), 0x4) [ 3081.628281][T13494] device bridge379 entered promiscuous mode [ 3081.644562][T13494] bond241: (slave bridge379): Enslaving as an active interface with an up link 01:23:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3081.683283][T13494] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:23:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbad, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3081.746931][T13494] device bond242 entered promiscuous mode [ 3081.822552][T13547] tipc: Not found cipher: "gcm("! [ 3081.872981][T13595] device bond243 entered promiscuous mode [ 3081.884758][T13584] tipc: Not found cipher: "gcm("! [ 3081.913858][T13595] bond243: (slave bridge381): making interface the new active one [ 3081.937253][T13595] device bridge381 entered promiscuous mode [ 3081.945081][T13595] bond243: (slave bridge381): Enslaving as an active interface with an up link [ 3081.967897][T13636] bond243: (slave bridge382): Enslaving as a backup interface with an up link 01:24:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:00 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:24:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbae, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3084.150669][T13644] tipc: Not found cipher: "gcm("! [ 3084.156097][T13643] validate_nla: 2 callbacks suppressed [ 3084.156129][T13643] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3084.157362][T13644] usb usb9: usbfs: process 13644 (syz-executor.3) did not claim interface 0 before use [ 3084.210621][T13643] device bond244 entered promiscuous mode [ 3084.239859][T13654] bond244: (slave bridge383): making interface the new active one [ 3084.248032][T13654] device bridge383 entered promiscuous mode [ 3084.254761][T13654] bond244: (slave bridge383): Enslaving as an active interface with an up link [ 3084.271544][T13643] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3084.289676][T13654] bond244: (slave bridge384): Enslaving as a backup interface with an up link 01:24:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001735623cb7ecfd99ea00f9ff66636d2862a97954800abfcc7939e46b717c3244c39c5ada3527d2ab63fd0af8c1060037d53d5f217dd72f6c4ddbb1741feac89fc2a37ed6c3b67e0ca48d2ac3cf7c750baa0fb56cb2688d6e1f0110748768e8a5497dd7c4fb1093628d240dc23810d5fe5c63769897e94ea4b990ccd2a64c55d58abb65341997ec937bc37f18fb403616c4ded1f3678bb8382903dc53b9e4ebcea8ab09f73dd5cc100621026821c39247b6ea7d4b6107c107"], 0x54}}, 0x0) 01:24:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbaf, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3084.525938][T13698] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3084.535130][T13699] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3084.575842][T13698] device bond245 entered promiscuous mode [ 3084.594459][T13734] bond245: (slave bridge385): making interface the new active one [ 3084.604054][T13738] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3084.605271][T13734] device bridge385 entered promiscuous mode 01:24:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0x10800) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)=0x1) ptrace$cont(0x20, r0, 0x0, 0x7f) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, 0x0, 0x1) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)={0x30, 0x35, 0x14, 0x12, 0x9, 0x700, 0x2, 0x16d, 0x7ffffffffffffffe}) shutdown(r2, 0x0) [ 3084.623083][T13734] bond245: (slave bridge385): Enslaving as an active interface with an up link [ 3084.636485][T13698] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3084.690541][T13734] bond245: (slave bridge386): Enslaving as a backup interface with an up link 01:24:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbb0, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3084.746531][T13742] tipc: Not found cipher: "gcm("! [ 3084.811406][T13751] tipc: Not found cipher: "gcm("! [ 3084.816500][T13764] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:00 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) dup(r1) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="53ffffe5", @ANYRES16=r3, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) [ 3084.875373][T13764] device bond246 entered promiscuous mode [ 3084.909945][T13783] bond246: (slave bridge387): making interface the new active one [ 3084.926096][T13783] device bridge387 entered promiscuous mode [ 3084.934628][T13783] bond246: (slave bridge387): Enslaving as an active interface with an up link [ 3084.953251][T13764] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3084.983872][T13783] bond246: (slave bridge388): Enslaving as a backup interface with an up link 01:24:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec5316", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x1ca00, 0x0) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) sendmsg$TIPC_NL_LINK_GET(r4, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="6e1810010000", @ANYRES16=r1, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0x2400c044}, 0x20000000) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x280801, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000180)={0x9, 0x2, 0x20, 0x7f, 0x81, 0x3, 0xe5, 0x1, 0x3c, 0x0, 0xdd, 0x7, 0x3f, 0x4}, 0xe) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) 01:24:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbb1, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3087.167152][T13814] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3087.224572][T13814] device bond247 entered promiscuous mode [ 3087.278258][T13812] tipc: Not found cipher: "gcm("! [ 3087.297425][T13850] bond247: (slave bridge389): making interface the new active one [ 3087.313038][T13850] device bridge389 entered promiscuous mode [ 3087.320419][T13850] bond247: (slave bridge389): Enslaving as an active interface with an up link [ 3087.359529][T13868] tipc: Not found cipher: "gcm("! [ 3087.364969][T13814] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3087.405046][T13850] bond247: (slave bridge390): Enslaving as a backup interface with an up link 01:24:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbb2, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3087.593900][T13881] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3087.634148][T13881] device bond248 entered promiscuous mode [ 3087.663051][T13924] bond248: (slave bridge391): making interface the new active one [ 3087.673318][T13924] device bridge391 entered promiscuous mode 01:24:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0c5fbc99", @ANYRES16=r1, @ANYBLOB="0100000000009f1a7e3871267f83340000000017f2cf2026b8d0d9a79b1c68000000400022a14d0b9dc6d30d779c6b17277a27b82e2aa38d90e8d5e4160751"], 0x54}, 0x1, 0x0, 0x0, 0x44800}, 0x0) 01:24:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3087.685321][T13924] bond248: (slave bridge391): Enslaving as an active interface with an up link [ 3087.709612][T13881] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) sendmmsg$inet6(r6, &(0x7f0000002280)=[{{&(0x7f00000001c0)={0xa, 0x4e22, 0xfffffffa, @loopback, 0x8000}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000200)="f020563fca51fb3a2f3dc6eaf7aa1acc6b748b8e4deea1aa248110eb47936bbfcddabcde223692df682fa99d1e9e67b6e43d5ce1dd770fc7a623b5ca77a3fb1544078924117c3866cb34d213fce831f46f4666d7a032a111396a9bed885703a8213ee06ca694dea2746061d953203270a253c020371a09e77ff31e6b8aab6864bde2a0557b", 0x85}], 0x1, &(0x7f0000001040)=[@dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @pktinfo={{0x24, 0x29, 0x32, {@private1, r9}}}, @rthdrdstopts={{0x1030, 0x29, 0x37, {0x0, 0x202, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x7, 0x1000, "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"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @pad1]}}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x29, 0x0, [], [@pad1]}}}], 0x1090}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000380)="8f9f5f5cc12412b9d581ac3d8bbca5826a5d9883368d2b9237e4c1c446dddb578cc03316d06c98822dec2636edc4eaae95e81c69c11659f0d996ce8e119cb02732d2e35e9a7e5a909c85392caf17c997a7d29bd61ff01c12e30909d3d3884586ef09db6ea44a134d17c4d63ec9cf86a2f3e0318198d3c9e45234df202e9a263ab444fee890ff248ea40441a3e34fe6461ae214485bf9ddd4532d8843c7a811c9a9e12234832bd9f3fd8c4ef2ed024b460540c3", 0xb3}, {&(0x7f0000000480)="9704d37d8e00614337ff822781132d0d25e6ea7d5d60dd304d0aee74c6dd1812140f5e9a1e998366068eba235dbb6bb8c7e00e4439772c73a902507f0339e99e0162f6ef75a69006795616e50e2cc1b019e40301c997870310a8764471f58eeae848da", 0x63}, {&(0x7f0000000500)="5e52d626dc1190240f9b79d87ebf22a566a7b97a623bfd801d1967a7aca521eecbaac7ec4403886e425db7cbc57ff197807a8fc9b6c6f4331363a09d1ebbe7146e3a03e84e12cb12a63daaa589ce0cab2cafc6f895522d7bf34377d1348b92acc86792360a8b7b7e7b58cf920eb67b738660792229b98604c42264f43cb29bc1f9b0541208c5756beb461b1cbec164d0f7ef7d917b5ad743b4ea2d41d2ddf2e10c76291b2e7d700eb0d06fbb41e977770354c6b1b891359784fd1d967b16e1992ff3bf8bf7145ab3c7387243306d", 0xce}, {&(0x7f0000000600)="f42cbff08089ca70928c6a2f6c6715fbd51202a74deaa3fc80b2a5cc8da94414d7611648eb85a140c6b00aedac1834beec2df611671850a95c525e7db5eba42f6ee4ab83d4792130032af7b82b390c535ce658f6864b67c995ede8356c36381d5b04773501f15c6b10abf5ac7134c0eb9e2e1f691622b657261d761fcaf973d113bc6e45e795019fd2d0e18a4b925388070752b9c968fee88bc6a4bd5bc28071b315281f26f4", 0xa6}, {&(0x7f00000006c0)="49a829dc448c0f3787acf50d1821821eb2017a75de4bd8c347fbe5a49c945b0759ff25c89537593c766c9b57c97b8dc8384406a81cbcb193191cfb60fe08e179b5c2f02109a5122a8e7bf5b679c697a88cc29bbdbac5e9163ad96e0b5cb5ada50dc671b9b01c5cb7bdd6a113b40cf54a8589f77d5f5517461b17436ac05006948485225a8e0b874cd7e33ecafeb2ae65ac9a884a0cf5640cf61c6ad7443162be6cb1f99c4f6e0b35fc9fcee08fe5daf7e3393cf2a36680fc5e37d8f9bf3405cbf7e3d8ab12c63e96b21a5c442db30d84f4aef776", 0xd4}], 0x5, &(0x7f0000000840)=[@hopopts_2292={{0x1a8, 0x29, 0x36, {0xa8, 0x31, [], [@pad1, @generic={0x8, 0xd6, "0ba59c19aa4ea1adf1f9fb42826a8db64986174f33724adf498e2a389f592ba894379a4d9f0e281a74c4079f003e72e9412c8523bcd0bc628a4d85dcab960db0b642d205ade2ce3274c1e71f350bbfc9d3bcbf04996cd09955e42344c923a777df7961b00cc4786b9490068c4db8347bba3ee8fb9dc974377eb3763e28439fe37747fbc9c1cc88d589a70bda493830785669f7228b5867e95f6bcb41624a94b3797021764fc66e9ad2925f4efd8f74746182b0ccfc28b16ae43ce92498ee30c58b0b6ad5029d1e4e50f56338f5ed1f57aaff78666212"}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x41}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x80000000}, @enc_lim={0x4, 0x1, 0x3}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x1f}}, @generic={0x8, 0x58, "0b7c2bb50df39fedadcc0dc8c6ab53bd6df9f83ca9c711637adab94455e29b78f0d81e131b043869df801766ea2eb0d55b1c04004845424c7f5cdb5f6235bf6a54959f9952a299dc9bb6d65c60414af17ea3b15615a2e737"}, @hao={0xc9, 0x10, @ipv4={[], [], @multicast1}}, @hao={0xc9, 0x10, @remote}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}, @tclass={{0x14, 0x29, 0x43, 0x4}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x62, 0x4, 0x2, 0xff, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0={0xfc, 0x0, [], 0x1}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}], 0x228}}, {{&(0x7f0000000a80)={0xa, 0x4e21, 0x9, @mcast1, 0x8001}, 0x1c, &(0x7f0000002200)=[{&(0x7f0000000ac0)="e3322f67920183a511fee55d5eab93bb5aead7383fe77840e4bceec9f346ee3af92b3c8f98e56b2fce5323fe06fa8c7a38b0779b7457cf6aadad200e9600d464a049fdf0599006f920e458aa42704513a350383c931fff8d77737683ebc5049394d32658172d67050fd49e0d5d2f50ae8e737aa5988afd3b18fec34a219dfcded3338d014d561d413a41b4197372b00c23de13e81014f14755fc9c490c1988cf11853df43ac289179f5ca9da23455f4640d9c29a7945340e9c049adac9c88a494e70bff188e41f5a813f4c58ffa51eaedf0b7bf8f4361121430037939791dfd34fc1edb881501582ff44c8ccab2c07782261196a", 0xf4}, {&(0x7f0000000bc0)="a00833225448be9e7e4ad8fc37971908dff402198e06ad63b5b3e8cb9b372b5768c955c80905d68a0c1c0bf69bb1ab7c08467009a7fe6e012d23f5c80503d0631fa60c7b669eea71d4760172442349e0777687f7593e0e573d5bc2d5565843ef71c56147a33ff5e9b63519a0feab2ef191edc67105f85f27874461d04e0a8111a4ef336d8d3e22bb5b18637617c3e6dbf29e50f3b06a7947fc563a959fa7f15ebb7ecd40ba9f360f6cc1db4fd859920418e5f6aa974fedfff649cf141f4f4a6c51c0914e01e5a07014", 0xc9}, {&(0x7f0000000cc0)="b0474652fcd447575747c2c1c6f31682236c639e64b063dbc448d8c331cae443e4d7744e770b72b00ceeb496df1c94043a38de2b74e43503332040cca0cbc5fbf6056f5026004a7d14d3ec6ff493edbf3366f79f05a9e37407632f751efd39922363c9441eff02c1b253a28afe5ac7652c3c6ea320d0d5a94c", 0x79}, {&(0x7f0000000d40)="3e8abdf2e0455753ba966447", 0xc}, {&(0x7f0000000d80)="624423cbca59d84157c35cf8cfdbe938023a6f8a296757dbe90170aabfa54ed2b144a00c52e0e6236fd64edb8f644ce79a20b280f0683475b1dff713327487ca9df40c90feea6e935188a0be5e89b13edde746542aef30adea7fa0d677832ae44ab3bdf917e3f7591f7c8c5b7a955c538194ca70282b4cb7507c255e9eac31364efe88ced9113a45816afb989178f544a194fa8017cf7989a5d8a5647d4f37f8e5e610ddcc53f9c8bca474a7bbbc267784a76459893ffcc1f6cbd18e0f26787f870c7a8e5f753b3a7eec2a9b2446dd5d35be6553de47188652", 0xd9}, {&(0x7f0000000e80)="3b73ad81de542a7831865a75eb881e379559443275dac0487fe77c51f0a36499a1547874c32ea0a428ac5a0ef75bedb8b98f47ec57ad1c20036172e1204bc67586d5894deeb5233b266193ae43b35639b3c57cd8dfce4f97a8038b622bb64657838dd34d14bd157a86f438989557ec737ad05ef99f14f57ed422334f0bc71097189d98087c39aa1baa82331f1fafe1e87ab778139b7fcd5df8c211e9ea0c42fd6172f583dbc5f59abf32ad5e5b3fb093ecdcceec916662fee69df815371fbbef49fcf23c41f7ce8f20bfc1d84523a5e61e1d864665a6c15fb526e5fee1a29a1f3e0baa256ece777878d88a6913b65c1f8ff5c6e894", 0xf5}, {&(0x7f0000002100)="3ea7bb8d37523481f26c099e2429d4e7764aabb6ea028520b9844b70b3a8386d5d09fba8edf6face43830dda12916ec483b8c5a8c6d5d868ccc19544158ef39b9a2e1cab34f8a56acd8c7bb7e1eb9adb54695912e6c92e3a7de904ff6becefb55f8a2bd8cd43b518ec076707d73995b5c3e4712e83fc8befa3f0d8df8c9f7b075bcb4b8b522bbc33fdc8aac13dc3dfc0d7ac638b1367bfdf7301d69a43ecc4d483015e1d219059a08ec8892a583b8c1f3edee680bf39e8d262ae5a90a38d46e602f3a85e3e5352e20774a76ce09ef661e855314a9ed7dd1a78fa3ad024874bf97f506cab58e6fa1d694902d0f923a0d942ad7f", 0xf3}, {&(0x7f0000000f80)="fe14b49b5f2bb9383e9fa4c590dae63914facbc12b15e71caa1a0578ec3cf832ebc6fae8b1aa321ea9ebb6efd4508e90660370f17d3056c48605c156d2b74d619db68b69fb918277ebf804807abb739763e88f44411c518f1c5210d5689a985f93cab1aaeab175463e79236cf0ab", 0x6e}], 0x8}}], 0x3, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r5, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) [ 3087.781321][T13924] bond248: (slave bridge392): Enslaving as a backup interface with an up link 01:24:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbb3, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3087.880684][T13944] tipc: Not found cipher: "gcm("! [ 3087.933312][T13953] device bond249 entered promiscuous mode [ 3087.954073][T13953] bond249: (slave bridge393): making interface the new active one [ 3087.962574][T13953] device bridge393 entered promiscuous mode [ 3087.988231][T13953] bond249: (slave bridge393): Enslaving as an active interface with an up link [ 3088.017867][T13987] tipc: Not found cipher: "gcm("! [ 3088.054638][T13993] bond249: (slave bridge394): Enslaving as a backup interface with an up link 01:24:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) r4 = socket$inet6(0xa, 0x2, 0x7) r5 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r7, @in={{0x2, 0x0, @empty}}, 0x3ff}, 0x90) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000080)={r7, 0x5, 0x1, 0x128d}, &(0x7f0000000240)=0x10) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYRESOCT=r3, @ANYRES16=r1, @ANYBLOB="01000025000000ecffff16100000400006803c0003b609cfa3f69d50c781989c54966a11bd6b5f87aa1e3af1afd2fed15123eb1a96cc01d79aadbd7b491a90b8fe8e245bb32134c2ec24f2a200aec9aa78c81a7334768520f637e2d718233b2ba754b359e780dcc1358f6960f9f064d18ee98d71d0b7f3dd562cd5f892835bfacb62a0edcce08636ba480fda492db4c3ce22daaeb94c79eff99a1f8b8c03c2293762ed0c5bbabecf7f0a4c6f505c05ce62e9fd37aa5062edd9607b2a01c8ddd3d0610f3a8cabb2013efc95ed0936374d7c5d744e05145b30bafcbab03f1d877560ef7d", @ANYRESDEC=r2], 0x54}}, 0x0) 01:24:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbb4, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3090.229383][T14001] validate_nla: 2 callbacks suppressed [ 3090.229394][T14001] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3090.305823][T14001] device bond250 entered promiscuous mode [ 3090.339777][T14012] bond250: (slave bridge395): making interface the new active one 01:24:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3090.351355][T14012] device bridge395 entered promiscuous mode [ 3090.358186][T14012] bond250: (slave bridge395): Enslaving as an active interface with an up link [ 3090.371143][T14001] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3090.411664][T14012] bond250: (slave bridge396): Enslaving as a backup interface with an up link 01:24:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbb5, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3090.641319][T14063] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3090.681889][T14063] device bond251 entered promiscuous mode [ 3090.701002][T14100] bond251: (slave bridge397): making interface the new active one [ 3090.710474][T14100] device bridge397 entered promiscuous mode [ 3090.716951][T14100] bond251: (slave bridge397): Enslaving as an active interface with an up link 01:24:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) 01:24:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbb6, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3090.735071][T14063] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3090.754908][T14100] bond251: (slave bridge398): Enslaving as a backup interface with an up link [ 3090.824825][T14107] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3090.882493][T14107] device bond252 entered promiscuous mode [ 3090.899553][T14137] bond252: (slave bridge399): making interface the new active one [ 3090.907682][T14137] device bridge399 entered promiscuous mode [ 3090.914306][T14137] bond252: (slave bridge399): Enslaving as an active interface with an up link 01:24:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbb7, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3090.932774][T14107] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3090.957028][T14137] bond252: (slave bridge400): Enslaving as a backup interface with an up link 01:24:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3091.006155][T14160] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3091.067102][T14160] device bond253 entered promiscuous mode [ 3091.132882][T14182] bond253: (slave bridge401): making interface the new active one [ 3091.143644][T14182] device bridge401 entered promiscuous mode [ 3091.151425][T14182] bond253: (slave bridge401): Enslaving as an active interface with an up link [ 3091.165514][T14160] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3091.200309][T14182] bond253: (slave bridge402): Enslaving as a backup interface with an up link 01:24:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x40, 0x0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYRES16=r1, @ANYBLOB="469586fc00000000000017000000400006803c00040067636d28"], 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) dup(r4) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r4, 0xc05064a7, &(0x7f0000000200)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], 0x2, 0x4, 0x4, 0x0, 0x3}) 01:24:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbb8, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3093.264040][T14214] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fallocate(r1, 0x15, 0x200, 0xffff) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) r4 = dup(r3) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r4, 0x89f4, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', r5, 0x29, 0x8, 0x6, 0xfff, 0x6c, @private1={0xfc, 0x1, [], 0x1}, @loopback, 0x7800, 0x40, 0xffffffce}}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="0000000054ebb64465375dbf2338f4c7fc99c9cdd1e6e4", @ANYRES16, @ANYBLOB="0100000000000000000017000000400006803c00040067636d2862b0fdd5e5d6a626cd578d7a4553693f59a351ffffffff00000000ae9fcb437482e30600000006595878be98a7b45e9967a55e399c2ef9900ad7266d8170dee60657b8ec86ee7d0db763daece3068538912aca1698dea78e1f6a5afd3a13c88fde45bec340e58b7434e9552372857fcc0e77c6ce0ebe701047ce71665e27fdbf22385ef452bee0924ce472b3e076caf747ea11e49078df856bad5326bac92bb738bbe84600a9faa77d5e1d5d91bd4096e14f23280b4a3b89bbc4d2a75a330027ff7b1d3fcc"], 0x54}}, 0x0) r6 = dup(0xffffffffffffffff) dup(r6) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0xfffffffffffffe64, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x4}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000280)={'team0\x00', r9}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000003c0)={'ip6gre0\x00', &(0x7f0000000340)={'syztnl2\x00', r10, 0x29, 0xc0, 0x0, 0xf0e, 0x7c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1, 0x8, 0x10, 0x100, 0x3dc}}) [ 3093.327479][T14214] device bond254 entered promiscuous mode [ 3093.363012][T14231] bond254: (slave bridge403): making interface the new active one [ 3093.376212][T14231] device bridge403 entered promiscuous mode [ 3093.383941][T14231] bond254: (slave bridge403): Enslaving as an active interface with an up link [ 3093.394152][T14261] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3093.406718][T14214] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3093.433249][T14231] bond254: (slave bridge404): Enslaving as a backup interface with an up link 01:24:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x81, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0x0) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC=r2], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x8200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x2, 0x8, 0x101, 0x0, 0x0, {0x7, 0x0, 0x7}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_COOKIE_WAIT={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x40051) 01:24:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbb9, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x21) 01:24:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3093.912459][T14281] tipc: Not found cipher: "gcm(00000000000000000004"! [ 3093.955896][T14287] device bond255 entered promiscuous mode [ 3093.982970][T14312] bond255: (slave bridge405): making interface the new active one [ 3093.992179][T14312] device bridge405 entered promiscuous mode [ 3093.999723][T14312] bond255: (slave bridge405): Enslaving as an active interface with an up link [ 3094.023264][T14340] bond255: (slave bridge406): Enslaving as a backup interface with an up link 01:24:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC=r2], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x8200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x2, 0x8, 0x101, 0x0, 0x0, {0x7, 0x0, 0x7}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_COOKIE_WAIT={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x40051) 01:24:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbba, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3096.307939][T14347] validate_nla: 2 callbacks suppressed [ 3096.307949][T14347] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3096.367995][T14347] device bond256 entered promiscuous mode 01:24:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC=r2], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x8200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x2, 0x8, 0x101, 0x0, 0x0, {0x7, 0x0, 0x7}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_COOKIE_WAIT={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x40051) [ 3096.409584][T14346] tipc: Not found cipher: "gcm(00000000000000000004"! [ 3096.426891][T14378] bond256: (slave bridge407): making interface the new active one [ 3096.436710][T14378] device bridge407 entered promiscuous mode [ 3096.444015][T14378] bond256: (slave bridge407): Enslaving as an active interface with an up link 01:24:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbbb, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3096.481164][T14347] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3096.521278][T14378] bond256: (slave bridge408): Enslaving as a backup interface with an up link [ 3096.594036][T14400] tipc: Not found cipher: "gcm(00000000000000000004"! [ 3096.601248][T14410] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3096.644460][T14410] device bond257 entered promiscuous mode [ 3096.679909][T14415] bond257: (slave bridge409): making interface the new active one [ 3096.689572][T14415] device bridge409 entered promiscuous mode [ 3096.696221][T14415] bond257: (slave bridge409): Enslaving as an active interface with an up link [ 3096.732073][T14415] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3096.776326][T14415] device bond258 entered promiscuous mode 01:24:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC=r2], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x8200) 01:24:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbbc, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x21) 01:24:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) dup(r2) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r4 = dup(r3) r5 = dup(r4) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3097.004168][T14491] tipc: Not found cipher: "gcm(00000000000000000004"! [ 3097.011220][T14494] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3097.044297][T14494] device bond259 entered promiscuous mode [ 3097.072798][T14503] bond259: (slave bridge411): making interface the new active one [ 3097.081462][T14503] device bridge411 entered promiscuous mode [ 3097.095066][T14503] bond259: (slave bridge411): Enslaving as an active interface with an up link [ 3097.111254][T14494] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3097.134090][T14503] bond259: (slave bridge412): Enslaving as a backup interface with an up link 01:24:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC=r2], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbbd, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3099.345320][T14554] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3099.414700][T14554] device bond260 entered promiscuous mode 01:24:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3099.465340][T14556] tipc: Not found cipher: "gcm(00000000000000000004"! 01:24:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC=r2], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3099.525987][T14576] bond260: (slave bridge413): making interface the new active one [ 3099.546644][T14576] device bridge413 entered promiscuous mode [ 3099.554536][T14576] bond260: (slave bridge413): Enslaving as an active interface with an up link 01:24:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbbe, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3099.609715][T14619] tipc: Not found cipher: "gcm(00000000000000000004"! [ 3099.617035][T14554] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3099.686486][T14631] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3099.752794][T14631] device bond261 entered promiscuous mode [ 3099.768584][T14641] bond261: (slave bridge415): making interface the new active one [ 3099.776490][T14641] device bridge415 entered promiscuous mode [ 3099.785290][T14641] bond261: (slave bridge415): Enslaving as an active interface with an up link [ 3099.799827][T14631] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3099.820593][T14641] bond261: (slave bridge416): Enslaving as a backup interface with an up link 01:24:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x21) 01:24:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$FIOCLEX(r4, 0x5451) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r5 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r5, 0xc0585605, &(0x7f0000000400)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1, 0xb}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x2) 01:24:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbbf, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x21) [ 3100.065660][T14678] device bond262 entered promiscuous mode 01:24:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3100.123706][T14676] tipc: Not found cipher: "gcm(18446744073709551615"! [ 3100.142097][T14678] bond262: (slave bridge417): making interface the new active one [ 3100.151179][T14678] device bridge417 entered promiscuous mode [ 3100.158647][T14678] bond262: (slave bridge417): Enslaving as an active interface with an up link 01:24:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbc0, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3100.202906][T14730] bond262: (slave bridge418): Enslaving as a backup interface with an up link [ 3100.291907][T14738] device bond263 entered promiscuous mode [ 3100.311478][T14738] bond263: (slave bridge419): making interface the new active one [ 3100.319737][T14738] device bridge419 entered promiscuous mode [ 3100.326141][T14738] bond263: (slave bridge419): Enslaving as an active interface with an up link [ 3100.350418][T14776] bond263: (slave bridge420): Enslaving as a backup interface with an up link 01:24:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbc1, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3102.515155][T14783] validate_nla: 4 callbacks suppressed [ 3102.515171][T14783] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3102.570466][T14783] device bond264 entered promiscuous mode [ 3102.592909][T14817] bond264: (slave bridge421): making interface the new active one [ 3102.600986][T14817] device bridge421 entered promiscuous mode [ 3102.611939][T14817] bond264: (slave bridge421): Enslaving as an active interface with an up link [ 3102.629934][T14783] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3102.651338][T14783] bond264: (slave bridge422): Enslaving as a backup interface with an up link 01:24:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8000, 0x0) r2 = getpid() r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) ptrace(0x11, r3) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbc2, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:19 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x21) 01:24:19 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:19 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3103.147211][T14844] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3103.190996][T14844] device bond265 entered promiscuous mode [ 3103.232910][T14889] bond265: (slave bridge423): making interface the new active one [ 3103.270874][T14889] device bridge423 entered promiscuous mode [ 3103.278765][T14889] bond265: (slave bridge423): Enslaving as an active interface with an up link [ 3103.292265][T14844] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3103.309817][T14889] bond265: (slave bridge424): Enslaving as a backup interface with an up link 01:24:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbc3, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3105.529521][T14901] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3105.563699][T14901] device bond266 entered promiscuous mode 01:24:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3105.609432][T14938] bond266: (slave bridge425): making interface the new active one [ 3105.625300][T14938] device bridge425 entered promiscuous mode [ 3105.640039][T14938] bond266: (slave bridge425): Enslaving as an active interface with an up link [ 3105.674483][T14901] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbc4, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x21) 01:24:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x1) r2 = accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @private}, &(0x7f0000000100)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f00000005c0)={{0x0, 0x0, 0x80}}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000180)=0x4) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x2, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) ptrace$setopts(0x4200, r3, 0x4, 0x9) tkill(r0, 0x3c) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x280, 0x0) ioctl$CHAR_RAW_SECDISCARD(r4, 0x127d, &(0x7f0000000040)=0x3) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:22 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x28100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000000)={0x2, 0x7fffffff, [{0x6, 0x0, 0x7}, {0x2, 0x0, 0x1000}]}) ptrace$setopts(0x4206, r0, 0xde0a, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3106.200348][T14962] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3106.264800][T14962] device bond267 entered promiscuous mode [ 3106.334963][T14970] bond267: (slave bridge427): making interface the new active one [ 3106.343026][T14970] device bridge427 entered promiscuous mode [ 3106.350629][T14970] bond267: (slave bridge427): Enslaving as an active interface with an up link [ 3106.363748][T14962] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3106.402937][T14970] bond267: (slave bridge428): Enslaving as a backup interface with an up link 01:24:24 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 01:24:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x404000, 0x0) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000040)={0x3, "1cb8464d27871b9d3a7b08fa1109c793e13452911b7ec1ec95d54da0349dc589", 0x2, 0xb70e282ceea1a356}) ptrace$cont(0x9, r0, 0x4, 0x21) 01:24:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbc5, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:24 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3108.658018][T15026] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, 0x0, 0x4000c) 01:24:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3108.762679][T15026] device bond268 entered promiscuous mode 01:24:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x21) 01:24:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, 0x0, 0x4000c) 01:24:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x21) [ 3108.809063][T15037] bond268: (slave bridge429): making interface the new active one [ 3108.824429][T15037] device bridge429 entered promiscuous mode [ 3108.842134][T15037] bond268: (slave bridge429): Enslaving as an active interface with an up link [ 3108.876112][T15037] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3108.965106][T15037] device bond269 entered promiscuous mode 01:24:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec531693", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 01:24:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x21) 01:24:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, 0x0, 0x4000c) 01:24:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbc6, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x11, r0, 0xfffffffffffffffd, 0xf264) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3111.712243][T15139] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec5316", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3111.817238][T15139] device bond270 entered promiscuous mode [ 3111.845232][T15153] bond270: (slave bridge431): making interface the new active one [ 3111.869549][T15153] device bridge431 entered promiscuous mode [ 3111.878785][T15153] bond270: (slave bridge431): Enslaving as an active interface with an up link 01:24:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3111.911201][T15139] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 01:24:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbc7, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:30 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000f6b827bc3375fa3639405cb4aed12f0000001500ae47a825d8680234432479aed75d492b415bcee00a06dc273101d43c79676e264ce7b49d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421340900000000000000ad037cd2157df6b2bcb47fb53455560c8ef00fca4ffe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0c0163801a5cb87c2cd725c5ddbb07b038c80493e7030990d7da0709b90f0ad8a02433187fde73386a2c0ef8521812794a27841f140e73736e079b805c572eb0000000000000000000000000000000000000000686bee7e9f6b3de498c0d31c154f1266010886abc6b6c2e66f2e99162363933db846ff38fb342e9f6b0454966dec5316", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r5 = dup(r4) r6 = dup(r5) ioctl$BLKZEROOUT(r6, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$vim2m_VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000001c0)={0x8, 0x3, 0x4, 0x400, 0x5, {0x0, 0x2710}, {0x4, 0x1, 0x3f, 0x2, 0x0, 0x1, "b8693694"}, 0x8, 0x3, @userptr=0x7fff, 0x1, 0x0, r6}) vmsplice(r7, &(0x7f0000000180)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:30 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3114.775631][T15219] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3114.791808][T15220] ptrace attach of "/root/syz-executor.5"[15218] was attempted by "/root/syz-executor.5"[15220] 01:24:30 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3114.872422][T15261] ptrace attach of "/root/syz-executor.5"[15260] was attempted by "/root/syz-executor.5"[15261] [ 3114.897542][T15219] device bond271 entered promiscuous mode [ 3114.954763][T15235] bond271: (slave bridge433): making interface the new active one [ 3114.977867][T15235] device bridge433 entered promiscuous mode 01:24:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3114.997444][T15235] bond271: (slave bridge433): Enslaving as an active interface with an up link [ 3115.013803][T15281] ptrace attach of "/root/syz-executor.5"[15280] was attempted by "/root/syz-executor.5"[15281] [ 3115.030478][T15219] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3115.088995][T15235] bond271: (slave bridge434): Enslaving as a backup interface with an up link 01:24:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000080)=0x9) ptrace$peek(0x2, r0, &(0x7f0000000040)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup(0xffffffffffffffff) dup(r1) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x30) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x21) r3 = dup(0xffffffffffffffff) dup(r3) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000000)={0x2}) 01:24:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbc8, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:33 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 01:24:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3117.846303][T15303] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:33 executing program 1: 01:24:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:33 executing program 1: 01:24:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3117.984334][T15303] device bond272 entered promiscuous mode 01:24:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3118.062712][T15314] bond272: (slave bridge435): making interface the new active one [ 3118.099390][T15314] device bridge435 entered promiscuous mode [ 3118.126558][T15314] bond272: (slave bridge435): Enslaving as an active interface with an up link [ 3118.176161][T15340] tipc: Not found cipher: "gcm("! [ 3118.181286][T15314] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3118.204366][T15373] bond272: (slave bridge436): Enslaving as a backup interface with an up link 01:24:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) r2 = dup(r1) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000000)={0x1, 0x1, 0x7fffffff}) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x21) 01:24:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:36 executing program 1: 01:24:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbc9, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:36 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b34, &(0x7f00000001c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\a\x00@\x00\x00\x00\x00\x00(\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff\x809P\xee\x8aG\xdd2\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\xc6G\xa36\xc70Zz\xc7\xe9\x8d\xe8\xd4\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x90(\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac\x14\x1fXf\xfd\xd0\x1e\x83\x7f\x80\xddL\x1bt% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1de\xf2z\x90\x15s\xf3\xce\xcd\x91\xa8\xeb\b\xae+\xea^\x8b\x05B\xc5\x1a\xdc,\x8bE\xa2<\x82e\xecI\xb4p\x05\xa3\x1bra\x9ax\x943\x00\xe5M\xefM\xda[\xb8\x86\xae\xb7') 01:24:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3120.981039][T15387] tipc: Not found cipher: "gcm("! [ 3120.997175][T15388] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d28"], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000020c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x1}, {}, {0x8}}, [@TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x44, 0x2, [@TCA_FW_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x20000000, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}]}]}}]}, 0x78}}, 0x0) r6 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000200), 0x4924924924926d3, 0x0) 01:24:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3121.139452][T15388] device bond273 entered promiscuous mode [ 3121.173447][T15399] bond273: (slave bridge437): making interface the new active one [ 3121.184956][T15399] device bridge437 entered promiscuous mode [ 3121.192492][T15399] bond273: (slave bridge437): Enslaving as an active interface with an up link 01:24:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3121.236106][T15430] tipc: Not found cipher: "gcm("! [ 3121.241219][T15450] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3121.274856][T15388] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbca, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3121.313689][T15470] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 01:24:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x9, 0x3, 0x370, 0xd0, 0x0, 0xb0, 0x0, 0xb0, 0x2d8, 0x1a8, 0x1a8, 0x2d8, 0x1a8, 0x3, 0x0, {[{{@ip={@broadcast, @empty}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x2, 0x7]}}}}, {{@uncond, 0x0, 0x1c0, 0x208, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'macsec0\x00', {0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x4}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 01:24:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3121.441140][T15489] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3121.441355][T15488] x_tables: duplicate underflow at hook 3 [ 3121.472631][T15493] x_tables: duplicate underflow at hook 3 01:24:37 executing program 1: [ 3121.514429][T15489] device bond274 entered promiscuous mode [ 3121.578606][T15510] bond274: (slave bridge439): making interface the new active one [ 3121.603763][T15510] device bridge439 entered promiscuous mode [ 3121.613293][T15510] bond274: (slave bridge439): Enslaving as an active interface with an up link [ 3121.626061][T15489] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3121.670885][T15510] bond274: (slave bridge440): Enslaving as a backup interface with an up link 01:24:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB, @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x15, @local, 0x4e20, 0x2, 'dh\x00', 0x0, 0x3, 0x4e}, 0x2c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x1) r2 = accept(r1, 0x0, &(0x7f0000000040)) accept$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7, 0x101120) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000180)) 01:24:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:40 executing program 1: 01:24:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbcb, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB, @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB, @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3124.164332][T15552] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:40 executing program 1: 01:24:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000170000", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3124.221021][T15552] device bond275 entered promiscuous mode [ 3124.273892][T15579] bond275: (slave bridge441): making interface the new active one [ 3124.282759][T15579] device bridge441 entered promiscuous mode [ 3124.311047][T15579] bond275: (slave bridge441): Enslaving as an active interface with an up link 01:24:40 executing program 1: 01:24:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3124.331684][T15603] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3124.389688][T15552] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3124.424376][T15579] bond275: (slave bridge442): Enslaving as a backup interface with an up link 01:24:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:42 executing program 1: [ 3127.049865][T15615] swap_info_get: Bad swap file entry 4003ffffffffffff [ 3127.057399][T15615] BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00134067 [ 3127.066684][T15615] addr:00007fa531d2d000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880a4c086e8 index:b2 [ 3127.077685][T15615] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 3127.084088][T15615] CPU: 0 PID: 15615 Comm: syz-executor.1 Not tainted 5.8.0-rc6-syzkaller #0 [ 3127.092729][T15615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3127.102757][T15615] Call Trace: [ 3127.106027][T15615] dump_stack+0x18f/0x20d [ 3127.110344][T15615] ? kcov_remote_reset+0xc0/0xc0 [ 3127.115260][T15615] print_bad_pte.cold+0x1e6/0x219 [ 3127.120291][T15615] ? pmd_pfn+0x1c0/0x1c0 [ 3127.124654][T15615] unmap_page_range+0x201a/0x2940 [ 3127.129666][T15615] ? vm_normal_page_pmd+0x5b0/0x5b0 [ 3127.134853][T15615] ? lock_downgrade+0x820/0x820 [ 3127.139702][T15615] ? uprobe_munmap+0x1c/0x560 [ 3127.144381][T15615] unmap_single_vma+0x198/0x300 [ 3127.149232][T15615] unmap_vmas+0x16f/0x2f0 [ 3127.153558][T15615] ? zap_vma_ptes+0x100/0x100 [ 3127.158235][T15615] ? uprobe_clear_state+0xf8/0x3b0 [ 3127.163360][T15615] exit_mmap+0x2b1/0x510 [ 3127.167605][T15615] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 3127.173607][T15615] __mmput+0x122/0x470 [ 3127.177682][T15615] mmput+0x53/0x60 [ 3127.181410][T15615] do_exit+0xa8f/0x2a40 [ 3127.185557][T15615] ? __close_fd+0x1d6/0x200 [ 3127.190043][T15615] ? mm_update_next_owner+0x7a0/0x7a0 [ 3127.195395][T15615] ? lock_downgrade+0x820/0x820 [ 3127.200225][T15615] ? do_raw_spin_lock+0x120/0x2b0 [ 3127.205245][T15615] ? rwlock_bug.part.0+0x90/0x90 [ 3127.210168][T15615] do_group_exit+0x125/0x310 [ 3127.214743][T15615] __x64_sys_exit_group+0x3a/0x50 [ 3127.219748][T15615] do_syscall_64+0x60/0xe0 [ 3127.224148][T15615] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3127.230017][T15615] RIP: 0033:0x45c1d9 [ 3127.233885][T15615] Code: Bad RIP value. [ 3127.237929][T15615] RSP: 002b:0000000000c9fd88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 01:24:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000170000", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbcc, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 3127.246316][T15615] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045c1d9 [ 3127.254264][T15615] RDX: 0000000000415d30 RSI: 0000000000000000 RDI: 0000000000000000 [ 3127.262215][T15615] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000c9fde0 [ 3127.270163][T15615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3127.278112][T15615] R13: 0000000000c9fde0 R14: 0000000000000000 R15: 0000000000c9fdf0 [ 3127.286522][T15615] Disabling lock debugging due to kernel taint [ 3127.303009][T15622] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3127.314237][T15623] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3127.327507][T15615] swap_info_get: Bad swap file entry 4003ffffffffffff [ 3127.334347][T15615] BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00134067 01:24:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x4, 0x2, 0x0, 0x0, 0x0}) vmsplice(r1, &(0x7f0000000480)=[{&(0x7f0000000080)="db96b8813ae2d00fed5b2dbfd9418d3072634dbf183f88739f7487f43e4b813891fdfac54edf425cf80d094b5d6de84219c918995eb5eb1b2fb0b44528fdde9fe0d520d671aae24eb33614ff663ed656d5b00edbe5efc78d13d714fb8ad69579c0eaa75bc13d79486da555d0590db21cad0b21dbdfa61889f0907d18c905b5fdb4455075c9b68584728d0b3fd36d8817346370015fad538f17109fddf65bb7a69ab721752f2b93f6cc7b727b7def692e69f194a10f27"}, {&(0x7f0000000140)="144b6dc0bc2a1c1a8b1dfc5ed86eee7fc67a95819273ae42ee57551e61c2f0d9dbee0172ece24432394aa0d414ccf5fd2facec77c6e4c19cbeddab2c0ae4"}, {&(0x7f0000000180)="94dba79d017d025fd5e0d2fc7ff42cd6eacceed1464a913304b8f9bc7b8a8e725ecc03bd3c58d3d149a9d8d69a4898dcf23dfe981e6845b26f4d884fdcc9b67a6c8013e95823eb8f214691116c8c5495dd517d3e4adace294172bca4b2662abe6462a7dfc1fb16fc3668d0582e0a93222a9e60301f5ae1f21177de5f178676745c5b12643418ff1e42c4eb5c92ceb65283179fe6344df3e4210207c005c8ac4bc7fdb3468569e37804746bb71df52b3f80"}, {&(0x7f0000000240)="79e85421811bdf42f38b3372d281a147de818edc5066bd8c256c06ea96fb2db80784ec24aef56acf6f54fdb8213833ef8dadc2bc13ed142ebbef60f7d82a98d1ecd90c8544b66dc77afbeaa3738c374f0c115d76d4c8bbb39be633c985320bf84f2494bc6ade2a998fa45aaa6d76062467"}, {&(0x7f00000002c0)="7fdfa73755f0eb8c60c0ab5366de7a8b39c0acd72d75f48326eaf8b2e7c30929da33a031"}, {&(0x7f0000000380)}, {&(0x7f0000001040)="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"}, {&(0x7f00000003c0)="37debd51c5bbd159eda818d55f97b1d2a69c92b381badcb670567e1d9a0e9dad16034d6969ad2b08adc7f0a3135a98511246ec7bc58802fb0b1d85e1228aa31c834e2ca142622bc1024d6187e4e79aab9df2eff0411dfda13a7212bc316ebed0064ef4a96b92147b83f20c9f79b6deac0b458d194b7e5460389611514e44b171933ccdbd83b21ff9a6022eb9bcdf8915711e0911dddb2f25d59e916f75d662e0af0cd60641c0e9b302ab100a71c92c"}], 0x27, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r3 = dup(r2) dup(r3) write$dsp(r3, &(0x7f0000000000)="1adee48d7b3e1acf5f22fc6831d8078622ee193e98694bf6707c9a47fdaa1e553e75865c252fa32c3e03d9f281b4c494405098f99a0712b47cb7e55fbe20163943228407dd4d6e3677fe184934376c8494dfbca298402bd5e0f783af7e0c22fd8f7d8860795559c5ed28eb00", 0x6c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) [ 3127.343548][T15615] addr:00007fa531dce000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880a4c086e8 index:153 [ 3127.354750][T15615] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 3127.361230][T15615] CPU: 0 PID: 15615 Comm: syz-executor.1 Tainted: G B 5.8.0-rc6-syzkaller #0 [ 3127.371277][T15615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3127.381315][T15615] Call Trace: [ 3127.384600][T15615] dump_stack+0x18f/0x20d [ 3127.388931][T15615] ? kcov_remote_reset+0xc0/0xc0 [ 3127.390042][T15622] device bond276 entered promiscuous mode [ 3127.393858][T15615] print_bad_pte.cold+0x1e6/0x219 [ 3127.393872][T15615] ? pmd_pfn+0x1c0/0x1c0 [ 3127.393889][T15615] unmap_page_range+0x201a/0x2940 [ 3127.393909][T15615] ? vm_normal_page_pmd+0x5b0/0x5b0 [ 3127.419009][T15615] ? lock_downgrade+0x820/0x820 [ 3127.423835][T15615] ? uprobe_munmap+0x1c/0x560 [ 3127.428497][T15615] unmap_single_vma+0x198/0x300 [ 3127.433340][T15615] unmap_vmas+0x16f/0x2f0 [ 3127.437666][T15615] ? zap_vma_ptes+0x100/0x100 [ 3127.442342][T15615] ? uprobe_clear_state+0xf8/0x3b0 01:24:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000170000", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3127.445249][T15631] bond276: (slave bridge443): making interface the new active one [ 3127.447450][T15615] exit_mmap+0x2b1/0x510 [ 3127.447468][T15615] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 3127.447489][T15615] __mmput+0x122/0x470 [ 3127.456153][T15631] device bridge443 entered promiscuous mode [ 3127.459480][T15615] mmput+0x53/0x60 [ 3127.459493][T15615] do_exit+0xa8f/0x2a40 [ 3127.459507][T15615] ? __close_fd+0x1d6/0x200 [ 3127.459525][T15615] ? mm_update_next_owner+0x7a0/0x7a0 [ 3127.485621][T15631] bond276: (slave bridge443): Enslaving as an active interface with an up link 01:24:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbcd, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3127.487692][T15615] ? lock_downgrade+0x820/0x820 [ 3127.487706][T15615] ? do_raw_spin_lock+0x120/0x2b0 [ 3127.487717][T15615] ? rwlock_bug.part.0+0x90/0x90 [ 3127.487735][T15615] do_group_exit+0x125/0x310 [ 3127.505977][T15622] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3127.506819][T15615] __x64_sys_exit_group+0x3a/0x50 [ 3127.506835][T15615] do_syscall_64+0x60/0xe0 [ 3127.506855][T15615] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3127.544640][T15615] RIP: 0033:0x45c1d9 [ 3127.548523][T15615] Code: Bad RIP value. [ 3127.551640][T15673] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3127.552578][T15615] RSP: 002b:0000000000c9fd88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 3127.552592][T15615] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045c1d9 [ 3127.552600][T15615] RDX: 0000000000415d30 RSI: 0000000000000000 RDI: 0000000000000000 [ 3127.552610][T15615] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000c9fde0 [ 3127.552624][T15615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3127.564373][T15671] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3127.569045][T15615] R13: 0000000000c9fde0 R14: 0000000000000000 R15: 0000000000c9fdf0 [ 3127.588966][T15615] swap_info_get: Bad swap file entry 4003ffffffffffff [ 3127.622696][T15673] device bond277 entered promiscuous mode [ 3127.625662][T15615] BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00135067 [ 3127.625676][T15615] addr:00007fa531e6f000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880a4c086e8 index:1f4 01:24:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3127.625699][T15615] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 3127.625713][T15615] CPU: 0 PID: 15615 Comm: syz-executor.1 Tainted: G B 5.8.0-rc6-syzkaller #0 [ 3127.625725][T15615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3127.677979][T15615] Call Trace: [ 3127.681270][T15615] dump_stack+0x18f/0x20d [ 3127.685609][T15615] ? kcov_remote_reset+0xc0/0xc0 [ 3127.690540][T15615] print_bad_pte.cold+0x1e6/0x219 [ 3127.695686][T15615] ? pmd_pfn+0x1c0/0x1c0 [ 3127.699928][T15615] unmap_page_range+0x201a/0x2940 01:24:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3127.704958][T15615] ? vm_normal_page_pmd+0x5b0/0x5b0 [ 3127.710153][T15615] ? lock_downgrade+0x820/0x820 [ 3127.714999][T15615] ? uprobe_munmap+0x1c/0x560 [ 3127.719675][T15615] unmap_single_vma+0x198/0x300 [ 3127.724526][T15615] unmap_vmas+0x16f/0x2f0 [ 3127.728851][T15615] ? zap_vma_ptes+0x100/0x100 [ 3127.733527][T15615] ? uprobe_clear_state+0xf8/0x3b0 [ 3127.738735][T15615] exit_mmap+0x2b1/0x510 [ 3127.742978][T15615] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 3127.748965][T15615] __mmput+0x122/0x470 [ 3127.753029][T15615] mmput+0x53/0x60 [ 3127.756745][T15615] do_exit+0xa8f/0x2a40 [ 3127.760897][T15615] ? __close_fd+0x1d6/0x200 [ 3127.765397][T15615] ? mm_update_next_owner+0x7a0/0x7a0 [ 3127.770761][T15615] ? lock_downgrade+0x820/0x820 [ 3127.775604][T15615] ? do_raw_spin_lock+0x120/0x2b0 [ 3127.777409][T15698] bond277: (slave bridge445): making interface the new active one [ 3127.780617][T15615] ? rwlock_bug.part.0+0x90/0x90 [ 3127.780635][T15615] do_group_exit+0x125/0x310 [ 3127.780650][T15615] __x64_sys_exit_group+0x3a/0x50 [ 3127.780663][T15615] do_syscall_64+0x60/0xe0 [ 3127.780682][T15615] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3127.788690][T15698] device bridge445 entered promiscuous mode [ 3127.793369][T15615] RIP: 0033:0x45c1d9 [ 3127.793374][T15615] Code: Bad RIP value. [ 3127.793381][T15615] RSP: 002b:0000000000c9fd88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 3127.793394][T15615] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045c1d9 [ 3127.793401][T15615] RDX: 0000000000415d30 RSI: 0000000000000000 RDI: 0000000000000000 [ 3127.793413][T15615] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000c9fde0 [ 3127.812790][T15698] bond277: (slave bridge445): Enslaving as an active interface with an up link [ 3127.813250][T15615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3127.825517][T15673] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3127.827061][T15615] R13: 0000000000c9fde0 R14: 0000000000000000 R15: 0000000000c9fdf0 [ 3127.835380][T15615] swap_info_get: Bad swap file entry 4003ffffffffffff [ 3127.860686][T15698] bond277: (slave bridge446): Enslaving as a backup interface with an up link [ 3127.868524][T15615] BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00135067 [ 3127.868537][T15615] addr:00007fa531f10000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880a4c086e8 index:95 [ 3127.868561][T15615] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 3127.868576][T15615] CPU: 0 PID: 15615 Comm: syz-executor.1 Tainted: G B 5.8.0-rc6-syzkaller #0 [ 3127.868584][T15615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3127.868588][T15615] Call Trace: [ 3127.868605][T15615] dump_stack+0x18f/0x20d [ 3127.868622][T15615] ? kcov_remote_reset+0xc0/0xc0 [ 3127.868634][T15615] print_bad_pte.cold+0x1e6/0x219 [ 3127.868652][T15615] ? pmd_pfn+0x1c0/0x1c0 [ 3127.976226][T15615] unmap_page_range+0x201a/0x2940 [ 3127.981248][T15615] ? vm_normal_page_pmd+0x5b0/0x5b0 [ 3127.986431][T15615] ? lock_downgrade+0x820/0x820 [ 3127.991262][T15615] ? uprobe_munmap+0x1c/0x560 [ 3127.995921][T15615] unmap_single_vma+0x198/0x300 [ 3128.000752][T15615] unmap_vmas+0x16f/0x2f0 [ 3128.005063][T15615] ? zap_vma_ptes+0x100/0x100 [ 3128.009724][T15615] ? uprobe_clear_state+0xf8/0x3b0 [ 3128.014827][T15615] exit_mmap+0x2b1/0x510 [ 3128.019055][T15615] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 3128.025027][T15615] __mmput+0x122/0x470 [ 3128.029075][T15615] mmput+0x53/0x60 [ 3128.032775][T15615] do_exit+0xa8f/0x2a40 [ 3128.036914][T15615] ? __close_fd+0x1d6/0x200 [ 3128.041398][T15615] ? mm_update_next_owner+0x7a0/0x7a0 [ 3128.046748][T15615] ? lock_downgrade+0x820/0x820 [ 3128.051579][T15615] ? do_raw_spin_lock+0x120/0x2b0 [ 3128.056580][T15615] ? rwlock_bug.part.0+0x90/0x90 [ 3128.061503][T15615] do_group_exit+0x125/0x310 [ 3128.066073][T15615] __x64_sys_exit_group+0x3a/0x50 [ 3128.071080][T15615] do_syscall_64+0x60/0xe0 [ 3128.075478][T15615] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3128.081347][T15615] RIP: 0033:0x45c1d9 [ 3128.085214][T15615] Code: Bad RIP value. [ 3128.089274][T15615] RSP: 002b:0000000000c9fd88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 3128.097661][T15615] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045c1d9 [ 3128.105624][T15615] RDX: 0000000000415d30 RSI: 0000000000000000 RDI: 0000000000000000 [ 3128.113593][T15615] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000c9fde0 [ 3128.121565][T15615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3128.129530][T15615] R13: 0000000000c9fde0 R14: 0000000000000000 R15: 0000000000c9fdf0 [ 3128.141755][T15615] swap_info_get: Bad swap file entry 4003ffffffffffff [ 3128.149098][T15615] BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00135067 [ 3128.158495][T15615] addr:00007fa531fb1000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880a4c086e8 index:136 [ 3128.169552][T15615] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 3128.176004][T15615] CPU: 1 PID: 15615 Comm: syz-executor.1 Tainted: G B 5.8.0-rc6-syzkaller #0 [ 3128.186051][T15615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3128.196179][T15615] Call Trace: [ 3128.199463][T15615] dump_stack+0x18f/0x20d [ 3128.203779][T15615] ? kcov_remote_reset+0xc0/0xc0 [ 3128.208705][T15615] print_bad_pte.cold+0x1e6/0x219 [ 3128.213712][T15615] ? pmd_pfn+0x1c0/0x1c0 [ 3128.217940][T15615] unmap_page_range+0x201a/0x2940 [ 3128.222941][T15615] ? vm_normal_page_pmd+0x5b0/0x5b0 [ 3128.228113][T15615] ? lock_downgrade+0x820/0x820 [ 3128.232941][T15615] ? uprobe_munmap+0x1c/0x560 [ 3128.237602][T15615] unmap_single_vma+0x198/0x300 [ 3128.242429][T15615] unmap_vmas+0x16f/0x2f0 [ 3128.246777][T15615] ? zap_vma_ptes+0x100/0x100 [ 3128.251437][T15615] ? uprobe_clear_state+0xf8/0x3b0 [ 3128.256543][T15615] exit_mmap+0x2b1/0x510 [ 3128.260772][T15615] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 3128.266743][T15615] __mmput+0x122/0x470 [ 3128.270792][T15615] mmput+0x53/0x60 [ 3128.274496][T15615] do_exit+0xa8f/0x2a40 [ 3128.278636][T15615] ? __close_fd+0x1d6/0x200 [ 3128.283113][T15615] ? mm_update_next_owner+0x7a0/0x7a0 [ 3128.288464][T15615] ? lock_downgrade+0x820/0x820 [ 3128.293356][T15615] ? do_raw_spin_lock+0x120/0x2b0 [ 3128.298366][T15615] ? rwlock_bug.part.0+0x90/0x90 [ 3128.303279][T15615] do_group_exit+0x125/0x310 [ 3128.307857][T15615] __x64_sys_exit_group+0x3a/0x50 [ 3128.312870][T15615] do_syscall_64+0x60/0xe0 [ 3128.317262][T15615] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3128.323125][T15615] RIP: 0033:0x45c1d9 [ 3128.326986][T15615] Code: Bad RIP value. [ 3128.331043][T15615] RSP: 002b:0000000000c9fd88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 3128.339427][T15615] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045c1d9 [ 3128.347378][T15615] RDX: 0000000000415d30 RSI: 0000000000000000 RDI: 0000000000000000 [ 3128.355332][T15615] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000c9fde0 [ 3128.363289][T15615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3128.371244][T15615] R13: 0000000000c9fde0 R14: 0000000000000000 R15: 0000000000c9fdf0 [ 3128.392426][T15615] BUG: Bad rss-counter state mm:000000003ef1fb04 type:MM_FILEPAGES val:5 [ 3128.401117][T15615] BUG: Bad rss-counter state mm:000000003ef1fb04 type:MM_SWAPENTS val:-5 01:24:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbce, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:46 executing program 1: 01:24:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:46 executing program 1: [ 3130.082749][T15735] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3130.113012][T15735] device bond278 entered promiscuous mode [ 3130.152042][T15736] tipc: Not found cipher: "g18446744073709551615"! [ 3130.187710][T15735] bond278: (slave bridge447): making interface the new active one [ 3130.195790][T15735] device bridge447 entered promiscuous mode [ 3130.202359][T15735] bond278: (slave bridge447): Enslaving as an active interface with an up link [ 3130.214768][T15735] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3130.231121][T15788] bond278: (slave bridge448): Enslaving as a backup interface with an up link 01:24:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x7, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:46 executing program 1: 01:24:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbcf, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:46 executing program 1: [ 3130.659894][T15796] tipc: Not found cipher: "g18446744073709551615"! [ 3130.667168][T15797] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3130.712403][T15797] device bond279 entered promiscuous mode [ 3130.730598][T15810] bond279: (slave bridge449): making interface the new active one [ 3130.740462][T15810] device bridge449 entered promiscuous mode [ 3130.748212][T15810] bond279: (slave bridge449): Enslaving as an active interface with an up link [ 3130.762268][T15797] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3130.777529][T15810] bond279: (slave bridge450): Enslaving as a backup interface with an up link 01:24:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:49 executing program 1: 01:24:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbd0, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:49 executing program 1: [ 3133.168877][T15856] tipc: Not found cipher: "g18446744073709551615"! [ 3133.178743][T15860] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3133.227879][T15860] device bond280 entered promiscuous mode [ 3133.241540][T15869] bond280: (slave bridge451): making interface the new active one [ 3133.252089][T15869] device bridge451 entered promiscuous mode [ 3133.258605][T15869] bond280: (slave bridge451): Enslaving as an active interface with an up link [ 3133.276026][T15860] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3133.290431][T15869] bond280: (slave bridge452): Enslaving as a backup interface with an up link 01:24:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r2, 0xc522, &(0x7f0000000040)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:49 executing program 1: 01:24:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbd1, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) [ 3133.658057][T15917] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3133.691810][T15917] device bond281 entered promiscuous mode [ 3133.740130][T15919] tipc: Not found cipher: "gcm18446744073709551615"! [ 3133.760414][T15917] bond281: (slave bridge453): making interface the new active one [ 3133.768325][T15917] device bridge453 entered promiscuous mode [ 3133.777186][T15917] bond281: (slave bridge453): Enslaving as an active interface with an up link [ 3133.817294][T15917] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3133.837332][T15971] bond281: (slave bridge454): Enslaving as a backup interface with an up link 01:24:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="6653070000053c27bc3375fa3639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6fff5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e050feace34b52d9e5f755563008c7e24ab61f0", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r2 = dup(r1) r3 = dup(r2) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x6600, 0x882200}) r4 = openat2(r3, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x10040, 0x112, 0x4}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000080)=0xc000, 0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x21) 01:24:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) 01:24:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) 01:24:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3fbd2, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 01:24:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) 01:24:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000400006803c00040067636d", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3136.192534][T15978] tipc: Not found cipher: "gcm18446744073709551615"! [ 3136.217259][T15986] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) [ 3136.281317][T15986] device bond282 entered promiscuous mode [ 3136.302237][T16008] bond282: (slave bridge455): making interface the new active one [ 3136.310138][T16008] device bridge455 entered promiscuous mode [ 3136.317906][T16008] bond282: (slave bridge455): Enslaving as an active interface with an up link 01:24:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, r2}}, 0x48) dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 01:24:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c) [ 3136.380757][T16039] tipc: Not found cipher: "gcm18446744073709551615"! [ 3136.388983][T16008] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 01:24:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYBLOB="0100000000000000000017000000400006803c00040067636d28", @ANYRESDEC], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000c)