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"}]}], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "3da006", 0x0, "88de25"}, "1842425531e7785833e7066ac164972a907dfb79387a40f832d7ab19b925498ab9beb3a8f74088e6431d8dfdff3e2b57cec02cf85e00f661c3a0c0a2eb7b417aad22882c47f6f048f461703c00eaf80ad1e4ed0ad3440f98068bd9f80b7db8d922a7475e0315821c9f306ddaf26d6bd87e"}}}}}}, 0x0) 13:35:51 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r0, 0xb}, {r1}], 0x2, 0x0, 0x0, 0x0) 13:35:51 executing program 0: timer_create(0x3, 0x0, &(0x7f00000011c0)) timer_gettime(0x0, 0x0) 13:35:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000001c40)=[{{&(0x7f0000000ac0)={0x2, 0x4e23, @local}, 0x10, 0x0, 0x0, &(0x7f0000001000)=[@ip_retopts={{0x10}}], 0x10}}], 0x1, 0x0) 13:35:51 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0x40, 0x0) 13:35:51 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r0, 0xb}, {r1}], 0x2, 0x0, 0x0, 0x0) 13:35:51 executing program 1: keyctl$unlink(0x9, 0x0, 0xfffffffffffffff9) [ 537.169139][T17252] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:51 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cachefiles\x00', 0x28000, 0x0) 13:35:51 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0xfffffffffffffd81) close(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010efa8c68d000000000000000000000a2000000002030100000000f787060000000000000900010001"], 0xcc}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000020301010104000000000000000000000800010002"], 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:35:51 executing program 5: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x2000c0, 0x0) 13:35:51 executing program 3: socket$inet6(0xa, 0xf, 0x0) 13:35:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:51 executing program 1: sendmsg$NL80211_CMD_ASSOCIATE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) 13:35:51 executing program 0: madvise(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x4) 13:35:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:35:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@empty, @empty, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100008a, r2}) 13:35:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000006800)={0x2, 0x0, @multicast2}, 0x10) 13:35:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) 13:35:52 executing program 1: migrate_pages(0x0, 0x6, 0x0, &(0x7f0000000080)=0x402) 13:35:52 executing program 3: r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/mnt\x00') [ 537.937864][T17283] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:52 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0xfffffffffffffd81) close(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010efa8c68d000000000000000000000a2000000002030100000000f787060000000000000900010001"], 0xcc}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000020301010104000000000000000000000800010002"], 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:35:52 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xed, &(0x7f00000000c0)='\x00\xb1G8\xfcn\xd1\xc8:{`\xfe\xa2Z\x9a\x89#qh\xc5L\xe2A\x8d.h\x8c\xdcm\xc1\x12j\xc0_\fZb\xef\xd5q/\x94gZp\xc3\x12\x15r\xe5\\VP\xef\t\xd1\x04\xec\x97G\x13\x01\xe2\x1e\x03\xf6b&\x8a\x19\xe8\x83\xe2\xf4\xbb\x9e\xfdrk\x10\x95\xfd\x1d\xa6\xc5\x03\b?\xf5J\xbb\x04h\x11\xd6\xe7\x7f1\xff*\x15\xe8;P\xa3\bX[Y\xd8!q4=oqL\xe5\xd7\xd5ESk\x11\xd0\x92\xcf\xbd\xda[z\x100-&\x8e\xa3\xedfq\xd1\x9e\x8a\x97!\x83c\xe4\x0e\x83\x1c\f\xd3V\x9b\xf6\xd9WI\x8c\x12\x1d\xc6\xaa\xb43\x84\xdd0^$\xf7\x03}\xbe\xec'}, 0xfffffffffffffdbf) 13:35:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xfffffffe, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x248, 0x90, 0x0, 0xb0, 0x0, 0xb0, 0x1b0, 0x1a8, 0x1a8, 0x1b0, 0x1a8, 0x3, 0x0, {[{{@ip={@multicast2, @broadcast, 0x0, 0x0, 'wlan1\x00', 'bond_slave_0\x00'}, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@inet=@set3={{0x50, 'set\x00'}, {{0x0, 0x6}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@multicast2, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:35:52 executing program 5: getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) 13:35:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x5, 0xffffffffffffffff, 0x4) 13:35:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 538.539865][T17301] x_tables: duplicate underflow at hook 3 13:35:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ppoll(&(0x7f0000001340)=[{r0}], 0x1, &(0x7f00000013c0)={0x0, 0x3938700}, 0x0, 0x0) 13:35:52 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={0x0, 0x0, 0x10}, 0x10) 13:35:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003b00)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f0000000000)=[{&(0x7f00000000c0)="26b7289cae5970ad685528a8f3dd3743b7bac95d6e5bdd2d1501a1b88446c5a660eaef241cb9b45c0ded8b64fbb3fb7669eac340380561cc20642c776c038b2384cd064aeea9a0463bee2c", 0x4b}, {&(0x7f0000000140)="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", 0x54a}], 0x2, &(0x7f0000001280)=[@dstopts_2292={{0x30, 0x29, 0x4, {0x0, 0x2, [], [@jumbo, @jumbo, @pad1, @enc_lim]}}}], 0x30}}, {{&(0x7f00000022c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x12, 0x0, 0x0, &(0x7f00000026c0)=[@hoplimit={{0x14}}], 0x18}}], 0x2, 0x0) [ 538.611318][T17307] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00'}) [ 538.857941][T17317] x_tables: duplicate underflow at hook 3 13:35:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000240), 0x8b, 0x0, &(0x7f0000000280)={0x0, 0x989680}, &(0x7f00000003c0), 0x2) readv(0xffffffffffffffff, &(0x7f0000000200), 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 13:35:53 executing program 1: sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000002070102"], 0x20}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB='@'], 0x54}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x447fe7, 0x0) [ 539.227839][T17326] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 13:35:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 13:35:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, 0x0, &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:53 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x8840, 0x0) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/153, 0x99}], 0x1) 13:35:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f000000a980)={0x0, 0x0, &(0x7f000000a940)={&(0x7f0000000540)=@deltfilter={0xec4, 0x2d, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0xe98, 0x2, [@TCA_U32_POLICE={0x81c, 0x6, [@TCA_POLICE_RATE={0x404}, @TCA_POLICE_AVRATE={0x8}, @TCA_POLICE_AVRATE={0x8}, @TCA_POLICE_PEAKRATE={0x404}]}, @TCA_U32_MARK={0x10}, @TCA_U32_DIVISOR={0x8}, @TCA_U32_INDEV={0x14, 0x8, 'batadv_slave_0\x00'}, @TCA_U32_ACT={0x64c, 0x7, [@m_gact={0x648, 0x0, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x4}, {0x619, 0x6, "c130fe24ca6fccb3c2034932cf79ce368775e3c0efd18f652299f5b935c135e613d146bacff362a46619ad26672288189c0d5e2c2e752467f0798307b38dd72f2357feec9648bbfb4bcc3093855360df8e138a98c01a2d61b9cafbc6d8cda281561cc9d9a6b451fa9e28d5b13af549abbb875a501f16b129aa22bee5495975831a09c76269341d0a0d35b9a7af51b305be3ff51fdc7a41fdd81d0d8c3b609638e168d3fd27b53c68465a03ccd0cdfdd7658bc19536fa514543ff20fe0dc22b11f32bed4b6226fe80b9a1c9bd7563a6bfa2114e183aad0aad1c9bb71a390514d6b6d4fef1db69d89b56f7bf0b79d223eea34c086fb912ed9e6b5145d04535e9cde37219f9c650bb2bbb6194c688fe74509f824da0e306cbadde3ddec4c72fb7f3dc97e5afc185699a79b32af7be5f7929ba7ef11088b84ab9938ba9e7395ec30617958c7e8b1c8d761acbdf95254e4edcc02336f03f3f1588aabdf0e0c2e278bdd9f55b305605dc0997a527197de4782d92a09b1cb4bf4b3e87e92c6890476b018d836332cb43d01802711db82b691fa237c7eaa2ef22cd89c4d5022c743f074ad6a146c5f18aacb22861205013a196b0d95ce898427b8fe7882d36b3fa830da20f151d48e029fa55b270fb82d0047666d95b11ebfba9bf1ff0bd15b9750e1d0c6ea960fa1257fcd62c19dcb4621d5a9a2f72b7b46d4ebe245e02131b58d9c484f3d94543c5bee94e70643b359b24d53c87450a23beec2685371e51583b086852916700c6922ab77be5449c9b5340b2b91657f91cbd8d75584702387632497de01bdc2a3b44d4cc08a51accfeaa592705a68b8f55094b87a2c49073f440cddd0f0dbf48005f0bf2d78bf3f0c0599019ff33bdb54b01e66afea28d5f5cdbb3cb8bfed95a6a0f1764b1583410948b195f080eebb092a7f0abc1918678d046029943f935b380eaaa1e1855f568877fd41e955e613a06e01feb657d2428f81db522eccca2358e4d94762d0f5ddf70a8432ec9296a653c5e9253a578705644dc4587906fa0bd7b2019b3cd54a965c40a2813dc4b63c83c745455d4f33aa61715f9553b020370df69a9b7047e61cee4e856b02910b46e7c3d17042d4d916348f8c736c86774906d4abd6cdf2600dcc6bbe1c80b64df7f3a739dd7d4169c5ed5a06817698e1449d4859528cb4f070eb2485638202d234ce34d3272385aebea123494270a78bf8555a5c47742035957fcf3b41e7c915b5f2b062bb9d0156ab7b7ef1184f697186d77d06b81e3b2cc851ebc55dd8509f0e9e3235ad0f73d011c49f34e1f779e9b693cae3566c58d711b9e1e94de59662f26f3c0ff32c9d646d62b6af891f88aba92910cbd28830ba43ea6dd95e3b58d67bfe94e98d3fd173cc56fb81444bc4d8d9d31802faa5616952981aefbe8bf585943ac9deda278a257d6d9041273ea7e9229b9c721077d36148abab8aca92e97ea9cb25bf9913f32b514c967f5f8c03e2dfc4fa5386cb79e4814334d6f2d0f2379608c160adc5c9d3bb951d4d9ee36b4c4d99292707304edf351c0f2fa0247db46c9b62343b986ce6222678b0dda2bfa726612a23780e39d9521863609d1ae5083e24441cc4aae6154b192055c06afe39121f256bea79e14b1060bf8a2ca9a4d90342b0446c3c8e6eb43b7673935f862332c2db8f06376110900c7a21a54c5022df0738836d72b5500655b6cfba3ec18af3085ffb2d7bebcc6062fbb84f7c5b64005937876bccb116a011959a921e18ee8d2ce01b24a2b3227d05188171d53a7fd1f45212bf13cdc8f656f84473fe1f40cda2d57bc06f86d0bdf55ae22a8d14cb89909d9b38684a15f0da770db9975d1cc79e947d127a09c1126bd0c96bf222ba46a5be1f9dee428f48df079d4009db0e1f480a5cad731060200c47ae8b53a9a7d014ee7e745673e940a67b94836054a4c253360da4838e79d460bbd3c37ebe069efa429a764cd7500de1a4e6dd13923e0f02c01aeac71af3d1b6d74cd676a8f63cc958f2e92be3b7287a674100b58af9665bac02c1212d0f59d8c0da05a621caf1779602a28bd62fc1b355cca25cd8488829638ff78db84acfc580f8a78354778db36b1b983ec29747ef6413f7b8fdd23b7d6fef95a6e979688be6e372e2ad278cbf529d1aa872d4e71c39fa88ebbee1139ce7a88f17eaef72d840463a0a6111aff9b2d"}, {0xc}, {0xc}}}]}]}}]}, 0xec4}}, 0x0) 13:35:53 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40200, 0x0) 13:35:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') 13:35:53 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000000)=0x2) 13:35:53 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:53 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000ac0)='logon\x00', &(0x7f0000000b00)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000b40)={0x0, "ccffc2c94d6b10456413397bcf0c2fbbc1c015a486d605abaeb6ab804baaeb72289c87610e26960cbcf52b3206fea6fc11a74d51be32c302e02752ee75dab7e7"}, 0x48, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='blacklist\x00', 0x0, 0x0, 0x0, r0) [ 539.646167][T17340] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x24008738, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) 13:35:54 executing program 4: mq_unlink(&(0x7f0000000000)='^!(,\'+([.\x00') 13:35:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000380)={'batadv_slave_0\x00'}) 13:35:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) 13:35:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, 0x0, &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000840)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5d0, 0x1b8, 0x288, 0x3b8, 0x3b8, 0xe8, 0x500, 0x500, 0x500, 0x500, 0x500, 0x6, 0x0, {[{{@ipv6={@loopback, @remote, [], [], 'macvtap0\x00', 'gretap0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@broadcast}}}, {{@ipv6={@dev, @local, [], [], 'veth0_to_hsr\x00', 'wlan0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@private0, @mcast2, [], [], 'veth1_to_bridge\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@ipv6={@private2, @private1, [], [], 'team0\x00', 'vlan0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast2, @ipv6=@remote}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x630) 13:35:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 13:35:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2, 0x0, 0x0) 13:35:54 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x145042, 0x0) r2 = memfd_create(&(0x7f0000000180)='p\xf9\x16l\xc9\xe1`\xe2\xc0w\xeaU\x1a\v\xb9\xfb\x1d\xa6F}_\xab5~\x9a\x18Oz\xfc\x8991\xf0\x85}\xa4\xb4\xeb\xf0\x18\x7f\x00\x00\x00~\x92\xcc0\xf1\xf3C\x04%\xc1\xac\xe9\x00\xdc\x1e\x1b\n&\xb4\xbe\xc6\xa8}E\xe2\xdb\x02{H\x88uR\x93C>c\x9c\x96\x907\x83\b4\x86\xb0\xe7\x10Qz\xc0N|\xa7ps\x8c\xdc\xecd\xedq\xa9\x1c\x1f\xb9B9\xf8<@\x05\x00\x00\x00\x7f\xa8)\xcf\b\xb9\xfd\x13\xaenA=o\x9a\xe4\xd3G\x91G5r\x12\x99.\x12\xe1\x12\xfe\xdfc8Y\x97\xc6\"Z\xb5\xd7\xccb+\xbe:\x80\xee\xd0Y\xe1~aNNC\xb6\xa6y\xa3=}=\xb3\xab\xecB\x00\xd0w\x16\xef\xb5\x02\f\xd1', 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000140)="fb", 0x1}], 0x1, 0x18181b, 0x0) sendfile(r1, r2, 0x0, 0x200000f) 13:35:54 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000000c0)) [ 540.272496][T17362] x_tables: duplicate underflow at hook 1 13:35:54 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x7) [ 540.349024][T17367] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:54 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x87d9}, 0x0, 0x0, &(0x7f0000000200)={0x0}) 13:35:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000580)=@buf={0x50, &(0x7f0000000380)="73d5caec314d5a89730b900eecc3d2edf78c1b49897557f67ff4ae73b014870f7b5346ed3db31eba7d84128867f8c23e19abc13b50814969d11f40048c440f03c4f98088bf62a52c0157cfc9b80bc83e"}) 13:35:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='setgroups\x00') tkill(0x0, 0x0) 13:35:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, 0x0, &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@empty, @empty, @dev, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x100008a, r2}) 13:35:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x1, 0x4) bind$inet(r0, &(0x7f00000005c0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:35:54 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000380)='/dev/bsg\x00', 0x20480, 0x0) 13:35:55 executing program 4: get_mempolicy(0x0, &(0x7f0000000040), 0xb7, &(0x7f0000ffc000/0x3000)=nil, 0x4) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 13:35:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f0000000080)=@xdp, &(0x7f0000000180)=0x80) [ 540.736640][T17389] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:55 executing program 1: request_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x0) 13:35:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x49, 0x0, 0x0) 13:35:55 executing program 4: syz_emit_ethernet(0x22, &(0x7f0000000180)={@random="9200", @random="9a1b78a7e46f", @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "9bcdcade7e83294e"}}}}, 0x0) 13:35:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:55 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0xd000) get_mempolicy(0x0, &(0x7f0000000040), 0xc00, &(0x7f0000ffd000/0x1000)=nil, 0x2) 13:35:55 executing program 5: timer_create(0x2, &(0x7f0000002ec0)={0x0, 0x2e, 0x0, @thr={0x0, 0x0}}, &(0x7f0000002f00)) 13:35:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), 0x0}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:35:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f0000000180)) 13:35:55 executing program 1: capget(&(0x7f0000000380), 0x0) 13:35:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 13:35:55 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x200038, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x18, 0x0, 0x60}}) r5 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r5, &(0x7f00000001c0)={0x2000001d}) 13:35:55 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/stat\x00', 0x0, 0x0) [ 541.463430][T17420] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:55 executing program 1: add_key$fscrypt_v1(&(0x7f0000000ac0)='logon\x00', &(0x7f0000000b00)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000b40)={0x0, "ccffc2c94d6b10456413397bcf0c2fbbc1c015a486d605abaeb6ab804baaeb72289c87610e26960cbcf52b3206fea6fc11a74d51be32c302e02752ee75dab7e7"}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000ac0)='logon\x00', &(0x7f0000000b00)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000b40)={0x0, "ccffc2c94d6b10456413397bcf0c2fbbc1c015a486d605abaeb6ab804baaeb72289c87610e26960cbcf52b3206fea6fc11a74d51be32c302e02752ee75dab7e7"}, 0x48, 0xfffffffffffffffe) 13:35:55 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/nvram\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 13:35:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), 0x0}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:55 executing program 5: migrate_pages(0x0, 0x8001, 0x0, &(0x7f0000000040)) 13:35:55 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000180)='./bus\x00', r0, &(0x7f0000000040)='./file0\x00', 0x0) [ 541.654039][ T34] audit: type=1400 audit(1608903355.890:127): avc: denied { block_suspend } for pid=17426 comm="syz-executor.4" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 13:35:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@empty, @empty, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100008a}) 13:35:56 executing program 3: msgsnd(0x0, &(0x7f0000000380)={0x3}, 0x8, 0x0) 13:35:56 executing program 5: msgsnd(0x0, &(0x7f0000006e40)={0x2}, 0x8, 0x0) 13:35:56 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x200038, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x18, 0x0, 0x60}}) r5 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r5, &(0x7f00000001c0)={0x2000001d}) [ 541.887452][T17452] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:56 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000180)='./bus\x00', r0, &(0x7f0000000040)='./file0\x00', 0x0) 13:35:56 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 13:35:56 executing program 5: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x40002) 13:35:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180), 0x4) 13:35:56 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x200038, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x18, 0x0, 0x60}}) r5 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r5, &(0x7f00000001c0)={0x2000001d}) 13:35:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), 0x0}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:56 executing program 1: creat(&(0x7f00000006c0)='./file0\x00', 0xa0ecfb6d43fc8a48) creat(&(0x7f0000003e00)='./file0\x00', 0x0) 13:35:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:35:56 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000180)='./bus\x00', r0, &(0x7f0000000040)='./file0\x00', 0x0) 13:35:56 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000100)=""/18}], 0x10000000000001e8) [ 542.512710][T17482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=17482 comm=syz-executor.3 13:35:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000001c0)=@abs={0x1}, 0x6e) [ 542.591439][T17490] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=17490 comm=syz-executor.3 13:35:56 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x200038, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x18, 0x0, 0x60}}) r5 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r5, &(0x7f00000001c0)={0x2000001d}) 13:35:56 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000100)="900000001c001f4d154a817393278bff0a808f78020000006c36710014000100ac1414bb0542d6401051a2d708f37ac8da1a29760099c5ac0000c5b068d0bf46d3234565778d8757006113ffaf6c3efed495a46215be0000766426c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b001500de1df32c1739d7fbee9aa2417318e9e0b390100000000000000000", 0x90, 0x0, 0x0, 0x0) [ 542.634060][T17493] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x9, 0x3, 0x1d0, 0x98, 0x0, 0xb0, 0x0, 0xb0, 0x138, 0x1a8, 0x1a8, 0x138, 0x1a8, 0x3, 0x0, {[{{@ip={@remote, @remote, 0x0, 0x0, 'virt_wifi0\x00', 'team0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x4}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x230) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x81, 0x4) bind$inet(r3, &(0x7f00000005c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:35:57 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000180)='./bus\x00', r0, &(0x7f0000000040)='./file0\x00', 0x0) 13:35:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prlimit64(0x0, 0x16, 0x0, 0x0) [ 542.832783][T17500] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.5'. 13:35:57 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) [ 542.916075][T17506] x_tables: duplicate underflow at hook 3 [ 542.961097][T17508] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:57 executing program 4: wait4(0x0, 0x0, 0x1000000, &(0x7f0000000280)) 13:35:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:57 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0xd000) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 13:35:57 executing program 0: shmctl$IPC_STAT(0x0, 0x2, 0xfffffffffffffffe) 13:35:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000003c80)={0x0, 0x0, &(0x7f0000003c40)={0x0}}, 0x5) 13:35:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(r0, 0x0, 0x0, 0x10121, 0x0, 0x0) [ 543.250539][T17522] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 543.313136][T17506] x_tables: duplicate underflow at hook 3 13:35:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1}, 0x100) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x310, 0x0, 0x0, 0x98, 0x0, 0x178, 0x240, 0x278, 0x278, 0x278, 0x240, 0x4, 0x0, {[{{@ip={@local, @multicast2, 0x0, 0x0, '\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xb8, 0xe8, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x9}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0xb0, 0xf8, 0x0, {}, [@common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@remote, 'veth0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xff78) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 13:35:57 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file1\x00', 0x1c1242, 0x0) r2 = memfd_create(&(0x7f0000000140)='iC;`\xb6p+\x10', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000300)='K', 0x1}], 0x1, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x101) sendfile(r1, r2, 0x0, 0x2000005) 13:35:57 executing program 0: mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x61b607966aa273f6, 0xffffffffffffffff, 0x0) 13:35:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x8, 0x2}, 0x10}}, 0x0) 13:35:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 543.538557][T17536] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:57 executing program 1: getgroups(0x1, &(0x7f0000000500)=[0xee01]) 13:35:57 executing program 0: modify_ldt$write(0x1, &(0x7f0000000400), 0x10) modify_ldt$read(0x0, &(0x7f0000000480)=""/246, 0xf6) 13:35:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003dc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{0x0}, {&(0x7f0000004fc0)="c2", 0x1}, {&(0x7f00000050c0)="fb", 0x1}], 0x3}, 0x0) 13:35:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000001c0)=@abs, 0x6e) [ 543.730988][T17548] x_tables: duplicate underflow at hook 2 [ 543.759314][T17550] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:58 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1e) close(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') unshare(0x20400) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 543.895967][T17548] x_tables: duplicate underflow at hook 2 13:35:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0217000624"], 0x120}}, 0x0) recvmmsg(r0, &(0x7f0000002d40)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/15, 0xf}], 0x1}}], 0x1, 0x0, 0x0) 13:35:58 executing program 5: timer_create(0x7, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000140)) timer_gettime(0x0, &(0x7f0000000180)) 13:35:58 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) r0 = eventfd(0x94200000) read$eventfd(r0, &(0x7f0000000040), 0x8) 13:35:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x5, 0xf56, 0x0, {0x0, 0x3}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) [ 544.054017][T17562] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:58 executing program 5: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_gettime(0x0, &(0x7f0000000180)) 13:35:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x5, 0xf56, 0x0, {0x0, 0x3}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) 13:35:58 executing program 1: fanotify_mark(0xffffffffffffffff, 0x45, 0x40000020, 0xffffffffffffffff, 0x0) 13:35:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@remote, @rand_addr=' \x01\x00', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0xfff}) [ 544.309575][T17580] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @ipv4={[], [], @empty}, 0x0, 0xfffd}) 13:35:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000e40)) 13:35:58 executing program 1: setresgid(0xffffffffffffffff, 0xee00, 0xffffffffffffffff) 13:35:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x5, 0xf56, 0x0, {0x0, 0x3}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) 13:35:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000180)) [ 544.572575][T17592] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:35:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @ipv4={[], [], @empty}, 0x0, 0xfffd}) 13:35:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:59 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/full\x00', 0x0, 0x0) 13:35:59 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/nvram\x00', 0x0, 0x0) fanotify_mark(r0, 0x5, 0x30, 0xffffffffffffffff, 0x0) 13:35:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x5, 0xf56, 0x0, {0x0, 0x3}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) 13:35:59 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) modify_ldt$write(0x1, &(0x7f0000000100)={0x1004}, 0x10) timer_create(0x0, &(0x7f0000000200)={0x0, 0x15, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) poll(0x0, 0x0, 0x1000) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:35:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @ipv4={[], [], @empty}, 0x0, 0xfffd}) 13:35:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:59 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/keys\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f0000000600)={""/12299}, 0x3200) 13:35:59 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x0, 0x3938700}, &(0x7f0000000200)={&(0x7f00000001c0)={[0xffffffffffff91e9]}, 0x8}) 13:35:59 executing program 4: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x9b6ad837ff64052f) 13:35:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @ipv4={[], [], @empty}, 0x0, 0xfffd}) 13:35:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:35:59 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/keys\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f0000000600)={""/12299}, 0x3200) 13:35:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$unix(r0, &(0x7f0000003f80)=@file={0x1, './file0\x00'}, 0x6e) 13:35:59 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x56, 0x0, [], [{}, {0xffffffff}]}) 13:35:59 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/keys\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f0000000600)={""/12299}, 0x3200) 13:36:00 executing program 3: keyctl$reject(0xc, 0x0, 0x400000, 0x200, 0x0) 13:36:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet(r0, 0x0, 0x0, 0x0) 13:36:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="280000002600815a"], 0x28}}, 0x0) recvmmsg(r2, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0, 0x0, 0x0, 0x500e0000}}], 0x344, 0x10122, 0x0) 13:36:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:00 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/keys\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f0000000600)={""/12299}, 0x3200) 13:36:00 executing program 5: select(0xfffffffffffffe86, &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) [ 545.995138][T17656] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 546.031519][T17656] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 13:36:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:00 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000980)='/dev/nvram\x00', 0x0, 0x0) 13:36:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 13:36:00 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000140)) 13:36:00 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg$sock(r0, &(0x7f0000002f40)=[{{&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "1efdbe904bf57f4137698a440e7ff63bd515532687ee4fac7cdacca35a6db15a30ddc75236fc3da20dab51a45d1569b5b2de9a9045dbf9c0abb2d008110590"}, 0x80, 0x0}}], 0x1, 0x0) [ 546.067464][T17656] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 546.125260][T17656] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 546.187450][T17656] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 13:36:00 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000040)=""/205, 0xcd}], 0x1) [ 546.296364][T17672] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 13:36:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 546.354020][ T34] audit: type=1326 audit(1608903360.591:128): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17663 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:00 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x161101, 0x0) 13:36:00 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x482, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvram\x00', 0x0, 0x0) 13:36:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, @fixed}, 0xe) listen(r0, 0x0) 13:36:00 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0x3) 13:36:00 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sysvipc/shm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) [ 546.570911][T17682] validate_nla: 5 callbacks suppressed [ 546.570929][T17682] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f6720", 0x7a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 546.635438][ T34] audit: type=1326 audit(1608903360.871:129): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17681 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4040015) 13:36:01 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) flock(r0, 0xc) 13:36:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:01 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x400) 13:36:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sysvipc/shm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) 13:36:01 executing program 4: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) clock_gettime(0x0, &(0x7f0000000940)) 13:36:01 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) setns(0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, 0x0, 0x0) 13:36:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) timer_create(0x0, 0x0, &(0x7f0000000240)) timer_getoverrun(0x0) [ 546.910539][ T34] audit: type=1326 audit(1608903361.141:130): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17694 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 546.936424][T17699] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sysvipc/shm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) 13:36:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0xfee0) [ 547.140233][ T34] audit: type=1326 audit(1608903361.371:131): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17709 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 547.249587][T17716] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 13:36:04 executing program 5: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) syz_emit_vhci(&(0x7f0000000080)=@HCI_VENDOR_PKT, 0x2) 13:36:04 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sysvipc/shm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) 13:36:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mknodat(0xffffffffffffff9c, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x0) [ 549.899097][ T34] audit: type=1326 audit(1608903364.131:132): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17738 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 549.944628][T17742] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000180)=@gcm_128={{}, "118a1fe8be22b0d1", "5cd56949b021f26ef4a238ad90862a63", "3aba48a5", "ce508131bbf4eb8b"}, 0x28) [ 549.985368][T17743] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:36:04 executing program 5: pselect6(0x40, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000480), &(0x7f0000000500)={&(0x7f00000004c0)={[0x9]}, 0x8}) 13:36:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:04 executing program 0: timer_create(0x0, &(0x7f00000002c0)={0x0, 0x1b}, &(0x7f0000000300)) 13:36:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f67206fdf76f1139b0d3561c6", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:04 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x40305828, 0x0) 13:36:04 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) [ 550.220905][T17753] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f67206fdf76f1139b0d3561c6", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:04 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) ioprio_set$pid(0x1, 0x0, 0x0) 13:36:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 550.593791][T17775] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 550.618867][ T34] audit: type=1326 audit(1608903364.851:133): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17773 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25", 0x71}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 550.795298][ T34] audit: type=1326 audit(1608903364.931:134): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17774 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc0"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000008c0)=0xffffffffffffff9f) 13:36:05 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:05 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:05 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8, 0x2, 0x1, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) [ 551.092888][T17793] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 551.318747][T17800] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:36:05 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00'}) 13:36:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f67206fdf76f1139b0d3561c6", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc0"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:07 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:07 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) [ 553.623274][T17822] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000001c0)={0x0, r0}) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000100)={0xd8, 0x7ff, 0x5, 0x1, 0x19, "0ebecd838edc49f7"}) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 13:36:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00002f5ff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) sched_getscheduler(r1) 13:36:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 13:36:08 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/sysvipc/shm\x00', 0x0, 0x0) 13:36:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc0"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 554.055788][ T34] audit: type=1326 audit(1608903368.291:135): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17831 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 554.085491][T17837] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000000c0), 0x10) 13:36:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000), 0x4) 13:36:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f67206fdf76f1139b0d3561c6", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a92"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:10 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) getrusage(0x0, &(0x7f0000000040)) 13:36:10 executing program 5: socket(0x18, 0x0, 0x4) 13:36:10 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) 13:36:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 13:36:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0\x00') [ 556.737719][ T34] audit: type=1326 audit(1608903370.972:136): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17867 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:11 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000140)) timer_gettime(0x0, 0x0) 13:36:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0x0, &(0x7f00000000c0)}) [ 556.788182][T17874] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, &(0x7f0000001180)=[{&(0x7f0000000080)="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", 0x9d9}, {&(0x7f0000001080)='*', 0x1}], 0x2, &(0x7f00000011c0)=[@hopopts_2292={{0xc8, 0x29, 0x36, {0x0, 0x16, [], [@pad1, @calipso={0x7, 0x38, {0x0, 0xc, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x4b, "427a19e5ada0f9ffb8c7111bcd0be2470f2b992cb61e77ef043539a8bf9b4ed005f14d8f0d6ed7753fa7b7c947f4ab585c00e7a59f039d7d6cab2c2518dfd798d1ad285e383acacaf96166"}, @ra, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}]}}}], 0xc8}, 0x0) [ 556.949837][ T34] audit: type=1326 audit(1608903371.182:137): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17877 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8934, &(0x7f0000000200)={'team_slave_0\x00', @ifru_addrs=@nfc}) 13:36:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) getrandom(0x0, 0x0, 0x0) [ 557.228172][ T34] audit: type=1326 audit(1608903371.462:138): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17889 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a92"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:14 executing program 4: r0 = socket(0x11, 0x3, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 13:36:14 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), 0x0) 13:36:14 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x4000, 0x0) 13:36:14 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000080)={@link_local, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x300, @multicast1}, {0x0, 0x0, 0x48, 0x0, @wg=@cookie={0x220, 0x0, "02005efe8d87f8ac00c639665b42d8756a614ad76143efc1", "67cc09ae1b0205a479c6f185807d54bc8c0d8839b0b4000000000500"}}}}}}, 0x0) 13:36:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000)=0x1ff, 0x4) 13:36:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) shmat(0x0, &(0x7f0000fef000/0x11000)=nil, 0x0) 13:36:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) getdents(0xffffffffffffffff, 0x0, 0x0) 13:36:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) tgkill(0x0, 0x0, 0x0) 13:36:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) faccessat(0xffffffffffffff9c, 0x0, 0x0) [ 559.933690][T17915] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 560.155387][ T34] audit: type=1326 audit(1608903374.392:139): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17918 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:14 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000140)=0x4) [ 560.263854][ T34] audit: type=1326 audit(1608903374.422:140): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17921 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 560.426260][ T34] audit: type=1326 audit(1608903374.432:141): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17919 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a92"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) fremovexattr(0xffffffffffffffff, 0x0) 13:36:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x4) 13:36:14 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, 0x0, 0x0) 13:36:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) epoll_create1(0x0) 13:36:14 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000480)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) [ 560.493809][ T34] audit: type=1326 audit(1608903374.462:142): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17920 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 560.546222][ T34] audit: type=1326 audit(1608903374.602:143): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17929 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 560.646098][ T34] audit: type=1326 audit(1608903374.862:144): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17936 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) rmdir(&(0x7f0000000140)='./file0\x00') 13:36:14 executing program 5: clock_gettime(0x0, &(0x7f0000000940)) 13:36:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x3) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') 13:36:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0xd01}, 0x14}}, 0x0) [ 560.790067][ T34] audit: type=1326 audit(1608903374.862:145): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) unshare(0x0) [ 560.830966][T17947] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 560.940685][ T34] audit: type=1326 audit(1608903375.182:146): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17948 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 561.096607][ T34] audit: type=1326 audit(1608903375.322:147): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17957 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 561.204124][ T34] audit: type=1326 audit(1608903375.442:148): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17966 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:15 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 13:36:15 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) 13:36:15 executing program 3: clock_getres(0xb7547d4eab3c304a, 0x0) 13:36:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 13:36:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/191) 13:36:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, &(0x7f0000001180)=[{&(0x7f0000000080)="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", 0x50d}], 0x1, &(0x7f00000011c0)=[@hopopts_2292={{0xb0, 0x29, 0x36, {0x0, 0x13, [], [@pad1, @calipso={0x7, 0x38, {0x0, 0xc, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x37, "427a19e5ada0f9ffb8c7111bcd0be2470f2b992cb61e77ef043539a8bf9b4ed005f14d8f0d6ed7753fa7b7c947f4ab585c00e7a59f039d"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}]}}}], 0xb0}, 0x0) 13:36:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x3) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') 13:36:15 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0xfdf9, 0xfffffffffffffffa) 13:36:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x10132) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:36:15 executing program 0: syz_genetlink_get_family_id$mptcp(&(0x7f00000007c0)='mptcp_pm\x00') [ 561.635450][T17984] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x12, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}, @sadb_spirange={0x2}]}, 0x30}}, 0x0) 13:36:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=""/113) 13:36:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8934, 0x0) 13:36:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) 13:36:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) clock_settime(0x0, 0x0) 13:36:16 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) 13:36:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 13:36:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 13:36:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) symlinkat(0x0, 0xffffffffffffffff, 0x0) 13:36:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000080), 0x4) [ 562.205553][T18015] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:16 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dri/renderD128\x00', 0x0, 0x0) 13:36:16 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000140)='tmpfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 13:36:16 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0xe501, 0x0) 13:36:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000000)=0x3, 0x4) 13:36:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) [ 562.669134][T18040] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 562.684093][T18041] tmpfs: Unknown parameter 'mask' 13:36:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000300), 0x4) [ 562.715089][T18041] tmpfs: Unknown parameter 'mask' 13:36:17 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:17 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x101, 0x0) 13:36:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, 0x0, 0x0) 13:36:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @private}}, 0x0, 0x0, 0x2b, 0x0, "010032361a87a413ae926c7cd7528586e7ffb4b40bd6ca4ba38a681b13eab7dea6d0f87e378b1cef5db70604c1629085d4d4e0b42b64ee383b0a33aacea878f9bfa2e67b2be530a9ee5143cb47de8100"}, 0xd8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000001480)=ANY=[@ANYRESHEX], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4107, 0x100b}], 0x1, 0x0, 0x0, 0x7115}, 0x100) 13:36:17 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000080)={@random="ff1f2b82ffb1", @broadcast=[0xff, 0xff, 0x0], @val, {@ipv6}}, 0x0) 13:36:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:17 executing program 0: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x7, 0x600) 13:36:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:17 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) 13:36:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf6467352", 0x54}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:17 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) 13:36:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) setregid(0x0, 0x0) [ 563.732046][T18078] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:18 executing program 1: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000240)=""/165) 13:36:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) getpriority(0x0, 0x0) 13:36:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) umount2(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r2, {0x7, 0x1f}}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000004280)="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", 0x2000, &(0x7f0000008b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x0, 0x0, 0x0, 0x0}) 13:36:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) setrlimit(0x0, &(0x7f0000000000)) 13:36:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:18 executing program 4: timer_create(0x307e22b4ff3716cc, 0x0, &(0x7f0000000000)) 13:36:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) clock_getres(0x0, 0x0) 13:36:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) [ 564.624824][T18112] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000140)={'veth1_to_batadv\x00', @ifru_hwaddr=@dev}) 13:36:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mknodat(0xffffffffffffff9c, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0) 13:36:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 13:36:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 566.825431][ T34] kauditd_printk_skb: 15 callbacks suppressed [ 566.825447][ T34] audit: type=1326 audit(1608903381.063:164): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18135 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 566.848092][T18141] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf425", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 566.904952][T18144] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:36:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uname(&(0x7f0000000080)=""/213) 13:36:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) inotify_init() [ 567.026732][ T34] audit: type=1326 audit(1608903381.133:165): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18136 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 13:36:21 executing program 5: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) [ 567.258018][ T34] audit: type=1326 audit(1608903381.493:166): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18151 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001ec0), 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x3) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) 13:36:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e1"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 567.417636][ T34] audit: type=1326 audit(1608903381.653:167): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18161 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) [ 567.581893][T18173] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) execve(0x0, 0x0, 0x0) 13:36:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x4, 0x0, &(0x7f0000000100)) 13:36:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) link(0x0, 0x0) 13:36:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) capget(&(0x7f0000000000)={0x20071026}, 0x0) [ 567.845995][ T34] audit: type=1326 audit(1608903382.083:168): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18181 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 567.957814][ T34] audit: type=1326 audit(1608903382.153:169): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18185 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 567.996169][T18190] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure [ 568.050591][ T34] audit: type=1326 audit(1608903382.283:170): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18187 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf425", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:24 executing program 0: shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffd000/0x3000)=nil) 13:36:24 executing program 5: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000100)=""/119) 13:36:24 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 13:36:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e1"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:24 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000140)) timer_create(0x2, 0x0, &(0x7f00000002c0)) 13:36:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') 13:36:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f00000001c0)=0x10000, 0x4) 13:36:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) 13:36:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) [ 570.272435][T18210] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:24 executing program 3: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x4) [ 570.420849][ T34] audit: type=1326 audit(1608903384.663:171): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18213 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) [ 570.716067][ T34] audit: type=1326 audit(1608903384.953:172): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18225 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf425", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8936, 0x0) 13:36:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe0000, &(0x7f0000000140), 0x0, &(0x7f0000000180)) 13:36:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) nanosleep(&(0x7f0000000000)={0x0, 0x989680}, 0x0) 13:36:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e1"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:27 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 13:36:27 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) [ 573.285709][ T34] audit: type=1326 audit(1608903387.523:173): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) [ 573.344805][T18248] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) inotify_init1(0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0xb8}, 0x1, 0x0, 0x0, 0x2000810}, 0x4bde50919caa9fe6) creat(&(0x7f0000000000)='./file0\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f000000a000)) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) 13:36:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) getdents64(0xffffffffffffff9c, 0x0, 0x0) 13:36:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0xc}, @NFQA_CFG_CMD={0x8}]}, 0x24}}, 0x0) 13:36:28 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000001ec0), 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x3) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') [ 573.939267][ T34] audit: type=1326 audit(1608903388.173:174): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18267 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 573.963345][T18270] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 574.009620][T18270] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 13:36:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf425", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:30 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 13:36:30 executing program 0: io_setup(0x1004, &(0x7f0000000000)=0x0) io_getevents(r0, 0x1, 0x1, &(0x7f00000000c0)=[{}], 0x0) 13:36:30 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x0) 13:36:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) ppoll(0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 576.413459][ T34] audit: type=1326 audit(1608903390.653:175): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18290 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:30 executing program 5: timer_create(0x0, 0x0, &(0x7f0000000140)) sched_rr_get_interval(0x0, &(0x7f0000000000)) 13:36:30 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:36:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) [ 576.487728][T18299] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 576.514524][ T34] audit: type=1326 audit(1608903390.653:176): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18289 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) getuid() [ 576.687717][ T34] audit: type=1326 audit(1608903390.923:177): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18306 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:31 executing program 1: utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={{0x77359400}}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) 13:36:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) [ 576.918541][ T34] audit: type=1326 audit(1608903391.153:178): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18313 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 577.044646][ T34] audit: type=1326 audit(1608903391.203:179): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18316 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f67206fdf76f1139b", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:33 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 13:36:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:33 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x28802, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 13:36:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 13:36:33 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) getpgid(0x0) 13:36:33 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x28802, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 13:36:33 executing program 1: stat(&(0x7f0000000440)='./file1\x00', 0x0) [ 579.657211][T18350] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 579.698422][ T34] audit: type=1326 audit(1608903393.934:180): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18346 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:34 executing program 4: msgrcv(0x0, 0x0, 0x0, 0x2, 0x3800) 13:36:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 13:36:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x28802, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 13:36:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) inotify_init1(0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) [ 580.094603][ T34] audit: type=1326 audit(1608903394.334:181): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18367 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:36 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000000)={0x0, 0x0, {}, {0xee00}}) 13:36:36 executing program 4: getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) 13:36:36 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x28802, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 13:36:36 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x10000000) 13:36:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 13:36:36 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x40, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f0000000740)=ANY=[@ANYBLOB="00000000462460ebe8d866f389cdd98175de6ce4f2bebab9e7eaa2974ff3053d3b7df05fd86597976ba873eb28be966fac568e6d94f0e43c417179b1d8a6e88c52454e4c72c6a6766d12070fafec8723bfbc1e2861b274", @ANYRES16, @ANYBLOB="00032bbd7000fcdbdf2501000000040001800800030007000000080002f700000000"], 0x28}, 0x1, 0x0, 0x0, 0x4008800}, 0x4008080) openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/partitions\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') 13:36:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) rt_sigpending(0x0, 0x0) [ 582.695065][T18396] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) msgsnd(0x0, &(0x7f00000000c0)={0x3}, 0x8, 0x0) 13:36:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f00000001c0)="0f08642e0f070f23d80f21f835000000f00f23f82ef4b8010000000f01c1b9800000c00f3235004000000f30b9800000c00f3235004000000f30b9c30d0000b88f270000ba00000000a730f3430f537b8fc422f932cf", 0x56}], 0x1, 0x0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x49, 0x0, {0x0, 0x0, 0x5}}, 0x14) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000004cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 582.925236][ T34] audit: type=1326 audit(1608903397.164:182): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18400 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:37 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) listxattr(0x0, 0x0, 0x0) 13:36:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f00000000c0)=""/89, &(0x7f0000000140)=0x59) [ 583.027155][ T34] audit: type=1326 audit(1608903397.204:183): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18401 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e8"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 583.155159][ T34] audit: type=1326 audit(1608903397.354:184): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18408 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 583.182847][T18413] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 13:36:37 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f00000002c0)=""/209, 0xd1) [ 583.245266][ T34] audit: type=1326 audit(1608903397.484:185): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18412 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 583.405126][ T34] audit: type=1326 audit(1608903397.644:186): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18422 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 583.407298][T18428] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:39 executing program 0: timer_create(0x3, 0x0, &(0x7f0000000200)) 13:36:39 executing program 1: timer_create(0x3, 0x0, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 13:36:39 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f0000000140)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}, 0x0) 13:36:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f0000000180), 0x4) 13:36:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e8"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:39 executing program 0: timer_create(0xb379c831131ec1c7, 0x0, 0x0) 13:36:40 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) fdatasync(0xffffffffffffffff) 13:36:40 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000080)='fscrypt-provisioning\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280), 0x8, 0xfffffffffffffff8) [ 585.722662][T18455] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:40 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x800, 0x0) 13:36:40 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000740)='/proc/key-users\x00', 0x0, 0x0) [ 585.936329][ T34] audit: type=1326 audit(1608903400.164:187): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18460 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:40 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000100)=[{0x0, 0xff7d}], 0x1) semop(0x0, 0x0, 0x0) 13:36:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) restart_syscall() 13:36:42 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/nvram\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 13:36:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e8"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) readlink(0x0, 0x0, 0x0) 13:36:42 executing program 4: timer_create(0x1, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000000040)) timer_gettime(0x0, 0x0) 13:36:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 588.774807][ T34] audit: type=1326 audit(1608903403.014:188): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 588.814395][T18497] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:43 executing program 5: socket$inet_icmp(0x2, 0x2, 0x1) r0 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0, 0x0) r1 = open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) pwritev(r2, 0x0, 0x0, 0x0, 0x0) dup2(r1, r2) 13:36:43 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) 13:36:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) syz_kvm_setup_cpu$x86(r5, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 588.899934][ T34] audit: type=1326 audit(1608903403.064:189): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18488 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:43 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) [ 589.082316][ T34] audit: type=1326 audit(1608903403.324:190): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18504 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) rename(&(0x7f0000000100)='./file1\x00', &(0x7f0000000340)='./bus\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 589.246974][ T34] audit: type=1804 audit(1608903403.484:191): pid=18514 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir366528493/syzkaller.hBHeoV/412/file0" dev="sda1" ino=16360 res=1 errno=0 [ 589.395445][ T34] audit: type=1800 audit(1608903403.594:192): pid=18509 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16360 res=0 errno=0 [ 589.521470][ T34] audit: type=1326 audit(1608903403.764:193): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18525 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 590.418032][ T9799] Bluetooth: hci3: command 0x0406 tx timeout 13:36:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) rt_sigaction(0x29, 0x0, 0x0, 0x8, &(0x7f0000000280)) 13:36:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:46 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @private}}, 0x0, 0x0, 0x2b, 0x0, "010032361a87a413ae926c7cd7528586e7ffb4b40bd6ca4ba38a681b13eab7dea6d0f87e378b1cef5db70604c1629085d4d4e0b42b64ee383b0a33aacea878f9bfa2e67b2be530a9ee5143cb47de8100"}, 0xd8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000001480)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4107, 0x100b}], 0x1, 0x0, 0x0, 0x7115}, 0x100) 13:36:46 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) sigaltstack(&(0x7f0000feb000/0x13000)=nil, 0x0) 13:36:46 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/msg\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 13:36:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) uname(&(0x7f00000001c0)=""/4096) [ 591.942420][ T34] audit: type=1326 audit(1608903406.185:194): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18542 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 591.977034][T18551] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f", 0x78}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:46 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:46 executing program 4: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/renderD128\x00', 0x109a80, 0x0) [ 592.067453][ T34] audit: type=1326 audit(1608903406.215:195): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18540 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 592.234908][ T34] audit: type=1326 audit(1608903406.475:196): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18555 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:46 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, 0x0) 13:36:46 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000080)=""/146) 13:36:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) inotify_init1(0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="ff03000067d23e9fb36c9ac7ffe41403ba88ba39511aa78dd79274b96a589e4c8ce40ffa77b372a34a172fcf3ed7593687ef40c4", @ANYRES16=0x0, @ANYBLOB="08002dbd70000000000018000000140006800d0003007afb80252ec6d07c0c0000007400068008000100040000000400020008000100d84600004500040067636d28616573290000000000000000000000000000000000000000000000001d000000f45a92c1838c2aa7ed10c2297660ff72c7acc2000000000000004159a600000004000200040002000400020008000100ffffff7f1c000980080002000060000008000200030000000800020000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x2000810}, 0x4bde50919caa9fe6) creat(&(0x7f0000000000)='./file0\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f000000a000)) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) 13:36:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) modify_ldt$read_default(0x2, 0x0, 0x0) 13:36:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:49 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = dup3(r2, r3, 0x0) syz_kvm_setup_cpu$x86(r5, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 595.045031][ T34] audit: type=1326 audit(1608903409.285:197): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18590 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) inotify_init1(0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="ff03000067d23e9fb36c9ac7ffe41403ba88ba39511aa78dd79274b96a589e4c8ce40ffa77b372a34a172fcf3ed7593687ef40c4", @ANYRES16=0x0, @ANYBLOB="08002dbd70000000000018000000140006800d0003007afb80252ec6d07c0c0000007400068008000100040000000400020008000100d84600004500040067636d28616573290000000000000000000000000000000000000000000000001d000000f45a92c1838c2aa7ed10c2297660ff72c7acc2000000000000004159a600000004000200040002000400020008000100ffffff7f1c000980080002000060000008000200030000000800020000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x2000810}, 0x4bde50919caa9fe6) creat(&(0x7f0000000000)='./file0\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f000000a000)) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) [ 595.093542][T18597] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 595.201028][ T34] audit: type=1326 audit(1608903409.405:198): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18602 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:49 executing program 5: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000080)={{0x3, 0x0, 0x0, 0xee00, 0xffffffffffffffff}}) 13:36:49 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0x6, @link_local}, 0x10) 13:36:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0)=0x7ff, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @private}}, 0x0, 0x0, 0x2b, 0x0, "010032361a87a413ae926c7cd7528586e7ffb4b40bd6ca4ba38a681b13eab7dea6d0f87e378b1cef5db70604c1629085d4d4e0b42b64ee383b0a33aacea878f9bfa2e67b2be530a9ee5143cb47de8100"}, 0xd8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000001480)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4107, 0x100b}], 0x1, 0x0, 0x0, 0x7115}, 0x100) 13:36:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) get_thread_area(0x0) 13:36:49 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfdb8, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) [ 595.528002][ T34] audit: type=1326 audit(1608903409.765:199): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18609 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) inotify_init1(0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="ff03000067d23e9fb36c9ac7ffe41403ba88ba39511aa78dd79274b96a589e4c8ce40ffa77b372a34a172fcf3ed7593687ef40c4", @ANYRES16=0x0, @ANYBLOB="08002dbd70000000000018000000140006800d0003007afb80252ec6d07c0c0000007400068008000100040000000400020008000100d84600004500040067636d28616573290000000000000000000000000000000000000000000000001d000000f45a92c1838c2aa7ed10c2297660ff72c7acc2000000000000004159a600000004000200040002000400020008000100ffffff7f1c000980080002000060000008000200030000000800020000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x2000810}, 0x4bde50919caa9fe6) creat(&(0x7f0000000000)='./file0\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f000000a000)) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) [ 595.702499][ T34] audit: type=1326 audit(1608903409.945:200): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18621 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:50 executing program 5: ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000000)) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000240)=""/165) 13:36:50 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) [ 595.866089][T18635] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:50 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:50 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000480)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) 13:36:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) inotify_init1(0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="ff03000067d23e9fb36c9ac7ffe41403ba88ba39511aa78dd79274b96a589e4c8ce40ffa77b372a34a172fcf3ed7593687ef40c4", @ANYRES16=0x0, @ANYBLOB="08002dbd70000000000018000000140006800d0003007afb80252ec6d07c0c0000007400068008000100040000000400020008000100d84600004500040067636d28616573290000000000000000000000000000000000000000000000001d000000f45a92c1838c2aa7ed10c2297660ff72c7acc2000000000000004159a600000004000200040002000400020008000100ffffff7f1c000980080002000060000008000200030000000800020000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x2000810}, 0x4bde50919caa9fe6) creat(&(0x7f0000000000)='./file0\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f000000a000)) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) [ 595.930425][ T34] audit: type=1326 audit(1608903410.175:201): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18640 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:50 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000000)={0x3, 0x0, {}, {0xee00}}) 13:36:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) timer_create(0x0, 0x0, &(0x7f0000000240)) timer_delete(0x0) 13:36:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xfde0, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_MULTICAST_FANOUT={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x54}}, 0x0) 13:36:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:36:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="ff03000067d23e9fb36c9ac7ffe41403ba88ba39511aa78dd79274b96a589e4c8ce40ffa77b372a34a172fcf3ed7593687ef40c4", @ANYRES16=0x0, @ANYBLOB="08002dbd70000000000018000000140006800d0003007afb80252ec6d07c0c0000007400068008000100040000000400020008000100d84600004500040067636d28616573290000000000000000000000000000000000000000000000001d000000f45a92c1838c2aa7ed10c2297660ff72c7acc2000000000000004159a600000004000200040002000400020008000100ffffff7f1c000980080002000060000008000200030000000800020000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x2000810}, 0x4bde50919caa9fe6) creat(&(0x7f0000000000)='./file0\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f000000a000)) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) [ 596.272029][ T34] audit: type=1326 audit(1608903410.515:202): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18648 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 596.390645][ T34] audit: type=1326 audit(1608903410.605:203): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18657 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') 13:36:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), 0x0, 0x8) [ 596.682975][T18675] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:51 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:51 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) readahead(0xffffffffffffffff, 0x0, 0x0) 13:36:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:51 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') 13:36:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) [ 597.096250][ T34] kauditd_printk_skb: 3 callbacks suppressed [ 597.096267][ T34] audit: type=1326 audit(1608903411.335:207): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18689 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 597.148075][T18701] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f67206fdf76f1139b0d3561c6b82b8235", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') 13:36:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x674}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x100000}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xb9\x18a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffe0}, r0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') 13:36:52 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8911, &(0x7f0000000000)={'gre0\x00', @ifru_mtu}) [ 598.271026][T18734] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) umount2(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:36:53 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1f) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 13:36:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 13:36:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:53 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d5, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) [ 599.359396][T18752] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:36:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f67206fdf76f1139b0d3561c6b82b8235", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) msgget$private(0x0, 0x0) 13:36:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000)=0x1fb, 0x4) 13:36:54 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/bus/input/devices\x00', 0x0, 0x0) 13:36:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) 13:36:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:36:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) msgrcv(0x0, &(0x7f0000001c80)={0x0, ""/242}, 0xfa, 0x0, 0x0) msgsnd(0x0, 0x0, 0x2d, 0x0) 13:36:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 600.648144][T18782] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 600.666157][T18778] FAT-fs (loop3): bogus number of reserved sectors [ 600.680076][ T34] audit: type=1326 audit(1608903414.925:208): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18773 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 600.743689][T18778] FAT-fs (loop3): Can't find a valid FAT filesystem 13:36:55 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) getpgrp(0xffffffffffffffff) 13:36:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f67206fdf76f1139b0d3561c6b82b8235", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 600.905136][ T34] audit: type=1326 audit(1608903415.145:209): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18789 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:55 executing program 5: timer_create(0x1, &(0x7f0000000340)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000380)) 13:36:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) eventfd2(0x0, 0x0) [ 601.030930][ T34] audit: type=1326 audit(1608903415.235:210): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18790 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:55 executing program 1: setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001180), 0x14) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/4096) [ 601.191380][ T34] audit: type=1326 audit(1608903415.325:211): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18795 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:55 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) 13:36:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) ioperm(0x0, 0x41a, 0x3) 13:36:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 601.278883][ T34] audit: type=1326 audit(1608903415.475:212): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18807 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:55 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 601.432561][ T34] audit: type=1326 audit(1608903415.675:213): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18815 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:36:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) pivot_root(0x0, 0x0) 13:36:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f67206fdf76f1139b0d35", 0x82}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 601.555310][ T34] audit: type=1326 audit(1608903415.795:214): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18821 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 601.578490][T18823] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 601.698383][ T34] audit: type=1326 audit(1608903415.945:215): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18825 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 [ 601.799377][ T34] audit: type=1326 audit(1608903415.985:216): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18827 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f5583624999c466534c3fd64362f39caf1715d25c2fd6d42bcec0576c8624862bd3e5cc03ca005bea0dd0f0ca5e61ca9762f963c2874cf2646c730000000000000000cdbbd542a9dde158d0cc5c90adf64673521411a57fe1e66f6a16196f843c84f649626751607e6bfcf42547f6ee25089834f2c9d40f67206fdf76f1139b0d3561c6b82b8235", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:36:58 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lookup_dcookie(0x0, 0x0, 0x0) 13:36:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) getegid() 13:36:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) removexattr(0x0, 0x0) 13:36:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 604.216403][ T34] audit: type=1326 audit(1608903418.456:217): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18847 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:58 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000002c0)={0x2020}, 0xfffffffffffffe53) 13:36:58 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x28, r1, 0x301, 0x0, 0x0, {{0x5}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 604.273769][T18855] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 604.295683][ T34] audit: type=1326 audit(1608903418.486:218): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18846 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0xffff0000 13:36:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0xcf07a70e26699db2) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x5) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @private}}, 0x0, 0x0, 0x2b, 0x0, "010032361a87a413ae926c7cd7528586e7ffb4b40bd6ca4ba38a681b13eab7dea6d0f87e378b1cef5db70604c1629085d4d4e0b42b64ee383b0a33aacea878f9bfa2e67b2be530a9ee5143cb47de8100"}, 0xd8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000001480)=ANY=[@ANYBLOB="2c03e2a8f80cc3ab31af0abc9d31dd716a6e7b87f326ddf714a6696cbf3b30a575874c134f2984419ba9ef970b24f63c36cc179781fd0e62c1e458bf17473d9b2c7c80c9b4a4a4c3d4242ac4d7967f2a5e0a8f11e7bf28f55accfc50151af39ae31758daf8bad0980c904e884bf8a600000000", @ANYRES64=r2, @ANYRESHEX=r2, @ANYRESDEC, @ANYRES16], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x0) 13:36:58 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0}, 0x68) 13:36:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @sco={0x1f, @fixed}, @nfc, @rc={0x1f, @none}}) 13:36:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @private1={0xfc, 0x1, [], 0x2}, @dev={0xfe, 0x80, [0xb, 0x14, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x2, 0xb, 0x3, 0x14, 0x8], 0x14}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20020002, r2}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x9, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20c200a2, r8}) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2, 0x80000000}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="70000000a486bf19000000000000000000df25802014b983540f6592cdb3000600150000007bce08", @ANYRESHEX=0x0, @ANYBLOB="08000300", @ANYRES16, @ANYRESHEX=r5, @ANYRES32=r3, @ANYBLOB="00b9fcde", @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYBLOB="08000b00290300040038bec50a4c6c2e3bd47642c6e8851eb96263f3e4c76195c47910ec10b8d2ab1b66c3129b729576c16eb0425fb5c0206bc9f6330ab8c07a9d7cfe74c34ac49548dd31d9cea7c777b8403d2bdd3ea8ed93184262e1f367c3f1a37ce772a08a9d6739e88ffb23f6e172db876d4399d45222b24129000000", @ANYRES64=r4, @ANYBLOB="9fcbe3d2472d5f24171b60e68b1a059400692062b342705613b82d3dc19dc0f5ba667f3d337cd74797b63ca94cb030129d7a13ab74803721e77a436496037fca78b1"], 0x70}}, 0x20000001) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x770, [0x0, 0x20000080, 0x200000b0, 0x2000019e], 0x0, &(0x7f0000000000), &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x5, 0x40, 0x800, 'geneve0\x00', 'dummy0\x00', 'bond_slave_1\x00', 'wlan0\x00', @remote, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @random="a4d5947a3aed", [0xff, 0xff, 0xff, 0xff], 0x6e, 0x6e, 0xbe, [], [], @common=@log={'log\x00', 0x28, {{0x2, "f0b07948a5c57c3f38105d31b00c390bcdef1a03b68baec30d5a8d0f6762", 0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{0x11, 0x28, 0x2, 'lo\x00', 'veth0_to_bond\x00', 'wlan1\x00', 'macvtap0\x00', @random="dcab30b4f52d", [0x0, 0x0, 0x0, 0xff], @local, [0x0, 0xff], 0x2d6, 0x356, 0x386, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x4, 0x3, 0x88a8, 0x2, 0xc}}}, @bpf0={{'bpf\x00', 0x0, 0x210}, {{0x34, [{0x3e, 0x6c, 0x32, 0xffffffff}, {0x1, 0x5, 0x6}, {0x80, 0x2, 0x8, 0x8fa}, {0x4, 0x7f, 0x2a, 0xe9}, {0x0, 0x7, 0x2, 0xfffff800}, {0x7b04, 0x1f, 0x5, 0x101}, {0x4, 0x1f, 0x80, 0xfe}, {0x6, 0x0, 0x9, 0xfffffff7}, {0x80, 0x8, 0x3, 0xffffffff}, {0xe3, 0x9, 0x6, 0xff}, {0x9, 0x1f, 0x1, 0x8}, {0xa0, 0x6, 0x4, 0x1ad}, {0xfc01, 0x9, 0xfc, 0x9d}, {0x7, 0xfb, 0x8, 0x8001}, {0x3de, 0x1, 0xa5, 0x20}, {0x7ff, 0x5, 0x0, 0x7}, {0xf4a6, 0x50, 0xe8, 0xffff}, {0x5, 0x8, 0x25, 0x27}, {0x4, 0x57, 0x0, 0xe85}, {0x9, 0x2, 0x0, 0x8}, {0x7f, 0x20, 0x5, 0x7}, {0x3, 0x7, 0x9, 0x9}, {0x0, 0x7f, 0x81, 0x5}, {0xffff, 0x81, 0x3}, {0x9, 0x5, 0x7f}, {0x1f, 0x83, 0xe6, 0x3}, {0x8, 0x6, 0x6, 0x3d38}, {0xfe1, 0xc, 0x0, 0xd13}, {0x4070, 0x9, 0x0, 0x80000000}, {0x6, 0xa9, 0x81, 0x4}, {0x9, 0x2, 0xe4, 0x1}, {0x8, 0x1, 0x1, 0x20}, {0x622, 0x3f, 0x7}, {0x0, 0x80, 0x0, 0x6}, {0x8, 0x1, 0x29, 0x2}, {0x7f, 0x7, 0x5c, 0x5}, {0x800, 0x80, 0x9, 0x40}, {0x8, 0x34, 0x9, 0xffffff87}, {0x5, 0x8, 0x2, 0x3}, {0x5, 0x7, 0x3, 0x3}, {0x99b, 0x81, 0x0, 0x401}, {0x100, 0xfe, 0x6, 0xa60}, {0x3, 0x3, 0x0, 0x7ff}, {0x21c4, 0x81, 0x1, 0xa5}, {0x1f, 0x0, 0x0, 0x10000}, {0xff, 0x6, 0x4, 0x1}, {0x7fff, 0x1, 0xc0, 0x3681}, {0xffff, 0xff, 0x1f, 0x1682}, {0x7, 0x4, 0x8, 0x9}, {0x7, 0x3, 0x7, 0x2}, {0x3, 0xf7, 0x4f, 0x1}, {0x1, 0x1, 0x80, 0xfff}, {0xfc0, 0x2, 0x2, 0x6a8}, {0x6, 0x8b, 0x1f, 0x9}, {0x1, 0x6, 0x6, 0x8}, {0x0, 0x1b, 0x2, 0xadd}, {0x9, 0x0, 0x2, 0x10000}, {0x969, 0x80, 0x3, 0x20}, {0x3f, 0x81, 0x79, 0x80}, {0x1, 0x2, 0x0, 0x3f}, {0x2, 0x80, 0x0, 0x2}, {0x3ff, 0x6, 0x81, 0x1ff}, {0x0, 0x8, 0x9, 0x8}, {0x8, 0x3f, 0xfe, 0xc2f}], {0x7}}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x1}}}, @common=@log={'log\x00', 0x28, {{0x4, "41719f156d5b8b0f5df4b0b27ebc9c01220c540038df4bf41b4614357239", 0xe}}}], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffb}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{0x5, 0x0, 0x6003, 'hsr0\x00', 'veth0_to_team\x00', 'ip_vti0\x00', 'batadv_slave_1\x00', @multicast, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @multicast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xfe, 0xfe, 0x146, [@arp={{'arp\x00', 0x0, 0x38}, {{0x110, 0xfbfb, 0x8, @local, 0xff, @empty, 0xff, @dev={[], 0x3a}, [0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0x2, 0x12}}}, @m802_3={{'802_3\x00', 0x0, 0x8}, {{0x2, 0x9, 0x2, 0x5}}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xf9, 0x7, {0x8d70}}}}}, {0x3, 0x13, 0x8137, 'vlan0\x00', 'batadv_slave_0\x00', 'wg2\x00', 'veth0_virt_wifi\x00', @local, [0xff], @local, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xae, 0xf6, 0x126, [@owner={{'owner\x00', 0x0, 0x18}, {{0x0, 0x0, 0x0, r4, 0x4, 0x1}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"4685f462f7abfea76ecbc70d6d523ceadfdb9a920344489dde82258abe6d"}}], @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x7e8) r9 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r9, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) 13:36:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r2, &(0x7f0000000580)={0x0, 0xa, &(0x7f0000000240)={&(0x7f00000005c0)={0x4c, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_FRAME={0x1c}]}, 0x4c}}, 0x0) 13:37:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x184, 0xffffffffffffffff, 0x80000002}, 0x40) 13:37:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 13:37:01 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffff001, 0x0) mmap$snddsp_status(&(0x7f0000ffb000/0x4000)=nil, 0x1000, 0x0, 0x10, r0, 0x82000000) 13:37:01 executing program 4: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0xedd72027d1f7c75d) 13:37:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @private1={0xfc, 0x1, [], 0x2}, @dev={0xfe, 0x80, [0xb, 0x14, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x2, 0xb, 0x3, 0x14, 0x8], 0x14}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20020002, r2}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x9, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20c200a2, r8}) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2, 0x80000000}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="70000000a486bf19000000000000000000df25802014b983540f6592cdb3000600150000007bce08", @ANYRESHEX=0x0, @ANYBLOB="08000300", @ANYRES16, @ANYRESHEX=r5, @ANYRES32=r3, @ANYBLOB="00b9fcde", @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYBLOB="08000b00290300040038bec50a4c6c2e3bd47642c6e8851eb96263f3e4c76195c47910ec10b8d2ab1b66c3129b729576c16eb0425fb5c0206bc9f6330ab8c07a9d7cfe74c34ac49548dd31d9cea7c777b8403d2bdd3ea8ed93184262e1f367c3f1a37ce772a08a9d6739e88ffb23f6e172db876d4399d45222b24129000000", @ANYRES64=r4, @ANYBLOB="9fcbe3d2472d5f24171b60e68b1a059400692062b342705613b82d3dc19dc0f5ba667f3d337cd74797b63ca94cb030129d7a13ab74803721e77a436496037fca78b1"], 0x70}}, 0x20000001) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x770, [0x0, 0x20000080, 0x200000b0, 0x2000019e], 0x0, &(0x7f0000000000), &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x5, 0x40, 0x800, 'geneve0\x00', 'dummy0\x00', 'bond_slave_1\x00', 'wlan0\x00', @remote, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @random="a4d5947a3aed", [0xff, 0xff, 0xff, 0xff], 0x6e, 0x6e, 0xbe, [], [], @common=@log={'log\x00', 0x28, {{0x2, "f0b07948a5c57c3f38105d31b00c390bcdef1a03b68baec30d5a8d0f6762", 0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{0x11, 0x28, 0x2, 'lo\x00', 'veth0_to_bond\x00', 'wlan1\x00', 'macvtap0\x00', @random="dcab30b4f52d", [0x0, 0x0, 0x0, 0xff], @local, [0x0, 0xff], 0x2d6, 0x356, 0x386, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x4, 0x3, 0x88a8, 0x2, 0xc}}}, @bpf0={{'bpf\x00', 0x0, 0x210}, {{0x34, [{0x3e, 0x6c, 0x32, 0xffffffff}, {0x1, 0x5, 0x6}, {0x80, 0x2, 0x8, 0x8fa}, {0x4, 0x7f, 0x2a, 0xe9}, {0x0, 0x7, 0x2, 0xfffff800}, {0x7b04, 0x1f, 0x5, 0x101}, {0x4, 0x1f, 0x80, 0xfe}, {0x6, 0x0, 0x9, 0xfffffff7}, {0x80, 0x8, 0x3, 0xffffffff}, {0xe3, 0x9, 0x6, 0xff}, {0x9, 0x1f, 0x1, 0x8}, {0xa0, 0x6, 0x4, 0x1ad}, {0xfc01, 0x9, 0xfc, 0x9d}, {0x7, 0xfb, 0x8, 0x8001}, {0x3de, 0x1, 0xa5, 0x20}, {0x7ff, 0x5, 0x0, 0x7}, {0xf4a6, 0x50, 0xe8, 0xffff}, {0x5, 0x8, 0x25, 0x27}, {0x4, 0x57, 0x0, 0xe85}, {0x9, 0x2, 0x0, 0x8}, {0x7f, 0x20, 0x5, 0x7}, {0x3, 0x7, 0x9, 0x9}, {0x0, 0x7f, 0x81, 0x5}, {0xffff, 0x81, 0x3}, {0x9, 0x5, 0x7f}, {0x1f, 0x83, 0xe6, 0x3}, {0x8, 0x6, 0x6, 0x3d38}, {0xfe1, 0xc, 0x0, 0xd13}, {0x4070, 0x9, 0x0, 0x80000000}, {0x6, 0xa9, 0x81, 0x4}, {0x9, 0x2, 0xe4, 0x1}, {0x8, 0x1, 0x1, 0x20}, {0x622, 0x3f, 0x7}, {0x0, 0x80, 0x0, 0x6}, {0x8, 0x1, 0x29, 0x2}, {0x7f, 0x7, 0x5c, 0x5}, {0x800, 0x80, 0x9, 0x40}, {0x8, 0x34, 0x9, 0xffffff87}, {0x5, 0x8, 0x2, 0x3}, {0x5, 0x7, 0x3, 0x3}, {0x99b, 0x81, 0x0, 0x401}, {0x100, 0xfe, 0x6, 0xa60}, {0x3, 0x3, 0x0, 0x7ff}, {0x21c4, 0x81, 0x1, 0xa5}, {0x1f, 0x0, 0x0, 0x10000}, {0xff, 0x6, 0x4, 0x1}, {0x7fff, 0x1, 0xc0, 0x3681}, {0xffff, 0xff, 0x1f, 0x1682}, {0x7, 0x4, 0x8, 0x9}, {0x7, 0x3, 0x7, 0x2}, {0x3, 0xf7, 0x4f, 0x1}, {0x1, 0x1, 0x80, 0xfff}, {0xfc0, 0x2, 0x2, 0x6a8}, {0x6, 0x8b, 0x1f, 0x9}, {0x1, 0x6, 0x6, 0x8}, {0x0, 0x1b, 0x2, 0xadd}, {0x9, 0x0, 0x2, 0x10000}, {0x969, 0x80, 0x3, 0x20}, {0x3f, 0x81, 0x79, 0x80}, {0x1, 0x2, 0x0, 0x3f}, {0x2, 0x80, 0x0, 0x2}, {0x3ff, 0x6, 0x81, 0x1ff}, {0x0, 0x8, 0x9, 0x8}, {0x8, 0x3f, 0xfe, 0xc2f}], {0x7}}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x1}}}, @common=@log={'log\x00', 0x28, {{0x4, "41719f156d5b8b0f5df4b0b27ebc9c01220c540038df4bf41b4614357239", 0xe}}}], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffb}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{0x5, 0x0, 0x6003, 'hsr0\x00', 'veth0_to_team\x00', 'ip_vti0\x00', 'batadv_slave_1\x00', @multicast, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @multicast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xfe, 0xfe, 0x146, [@arp={{'arp\x00', 0x0, 0x38}, {{0x110, 0xfbfb, 0x8, @local, 0xff, @empty, 0xff, @dev={[], 0x3a}, [0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0x2, 0x12}}}, @m802_3={{'802_3\x00', 0x0, 0x8}, {{0x2, 0x9, 0x2, 0x5}}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xf9, 0x7, {0x8d70}}}}}, {0x3, 0x13, 0x8137, 'vlan0\x00', 'batadv_slave_0\x00', 'wg2\x00', 'veth0_virt_wifi\x00', @local, [0xff], @local, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xae, 0xf6, 0x126, [@owner={{'owner\x00', 0x0, 0x18}, {{0x0, 0x0, 0x0, r4, 0x4, 0x1}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"4685f462f7abfea76ecbc70d6d523ceadfdb9a920344489dde82258abe6d"}}], @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x7e8) r9 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r9, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) 13:37:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @private1={0xfc, 0x1, [], 0x2}, @dev={0xfe, 0x80, [0xb, 0x14, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x2, 0xb, 0x3, 0x14, 0x8], 0x14}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20020002, r2}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x9, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20c200a2, r8}) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2, 0x80000000}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="70000000a486bf19000000000000000000df25802014b983540f6592cdb3000600150000007bce08", @ANYRESHEX=0x0, @ANYBLOB="08000300", @ANYRES16, @ANYRESHEX=r5, @ANYRES32=r3, @ANYBLOB="00b9fcde", @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYBLOB="08000b00290300040038bec50a4c6c2e3bd47642c6e8851eb96263f3e4c76195c47910ec10b8d2ab1b66c3129b729576c16eb0425fb5c0206bc9f6330ab8c07a9d7cfe74c34ac49548dd31d9cea7c777b8403d2bdd3ea8ed93184262e1f367c3f1a37ce772a08a9d6739e88ffb23f6e172db876d4399d45222b24129000000", @ANYRES64=r4, @ANYBLOB="9fcbe3d2472d5f24171b60e68b1a059400692062b342705613b82d3dc19dc0f5ba667f3d337cd74797b63ca94cb030129d7a13ab74803721e77a436496037fca78b1"], 0x70}}, 0x20000001) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x770, [0x0, 0x20000080, 0x200000b0, 0x2000019e], 0x0, &(0x7f0000000000), &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x5, 0x40, 0x800, 'geneve0\x00', 'dummy0\x00', 'bond_slave_1\x00', 'wlan0\x00', @remote, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @random="a4d5947a3aed", [0xff, 0xff, 0xff, 0xff], 0x6e, 0x6e, 0xbe, [], [], @common=@log={'log\x00', 0x28, {{0x2, "f0b07948a5c57c3f38105d31b00c390bcdef1a03b68baec30d5a8d0f6762", 0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{0x11, 0x28, 0x2, 'lo\x00', 'veth0_to_bond\x00', 'wlan1\x00', 'macvtap0\x00', @random="dcab30b4f52d", [0x0, 0x0, 0x0, 0xff], @local, [0x0, 0xff], 0x2d6, 0x356, 0x386, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x4, 0x3, 0x88a8, 0x2, 0xc}}}, @bpf0={{'bpf\x00', 0x0, 0x210}, {{0x34, [{0x3e, 0x6c, 0x32, 0xffffffff}, {0x1, 0x5, 0x6}, {0x80, 0x2, 0x8, 0x8fa}, {0x4, 0x7f, 0x2a, 0xe9}, {0x0, 0x7, 0x2, 0xfffff800}, {0x7b04, 0x1f, 0x5, 0x101}, {0x4, 0x1f, 0x80, 0xfe}, {0x6, 0x0, 0x9, 0xfffffff7}, {0x80, 0x8, 0x3, 0xffffffff}, {0xe3, 0x9, 0x6, 0xff}, {0x9, 0x1f, 0x1, 0x8}, {0xa0, 0x6, 0x4, 0x1ad}, {0xfc01, 0x9, 0xfc, 0x9d}, {0x7, 0xfb, 0x8, 0x8001}, {0x3de, 0x1, 0xa5, 0x20}, {0x7ff, 0x5, 0x0, 0x7}, {0xf4a6, 0x50, 0xe8, 0xffff}, {0x5, 0x8, 0x25, 0x27}, {0x4, 0x57, 0x0, 0xe85}, {0x9, 0x2, 0x0, 0x8}, {0x7f, 0x20, 0x5, 0x7}, {0x3, 0x7, 0x9, 0x9}, {0x0, 0x7f, 0x81, 0x5}, {0xffff, 0x81, 0x3}, {0x9, 0x5, 0x7f}, {0x1f, 0x83, 0xe6, 0x3}, {0x8, 0x6, 0x6, 0x3d38}, {0xfe1, 0xc, 0x0, 0xd13}, {0x4070, 0x9, 0x0, 0x80000000}, {0x6, 0xa9, 0x81, 0x4}, {0x9, 0x2, 0xe4, 0x1}, {0x8, 0x1, 0x1, 0x20}, {0x622, 0x3f, 0x7}, {0x0, 0x80, 0x0, 0x6}, {0x8, 0x1, 0x29, 0x2}, {0x7f, 0x7, 0x5c, 0x5}, {0x800, 0x80, 0x9, 0x40}, {0x8, 0x34, 0x9, 0xffffff87}, {0x5, 0x8, 0x2, 0x3}, {0x5, 0x7, 0x3, 0x3}, {0x99b, 0x81, 0x0, 0x401}, {0x100, 0xfe, 0x6, 0xa60}, {0x3, 0x3, 0x0, 0x7ff}, {0x21c4, 0x81, 0x1, 0xa5}, {0x1f, 0x0, 0x0, 0x10000}, {0xff, 0x6, 0x4, 0x1}, {0x7fff, 0x1, 0xc0, 0x3681}, {0xffff, 0xff, 0x1f, 0x1682}, {0x7, 0x4, 0x8, 0x9}, {0x7, 0x3, 0x7, 0x2}, {0x3, 0xf7, 0x4f, 0x1}, {0x1, 0x1, 0x80, 0xfff}, {0xfc0, 0x2, 0x2, 0x6a8}, {0x6, 0x8b, 0x1f, 0x9}, {0x1, 0x6, 0x6, 0x8}, {0x0, 0x1b, 0x2, 0xadd}, {0x9, 0x0, 0x2, 0x10000}, {0x969, 0x80, 0x3, 0x20}, {0x3f, 0x81, 0x79, 0x80}, {0x1, 0x2, 0x0, 0x3f}, {0x2, 0x80, 0x0, 0x2}, {0x3ff, 0x6, 0x81, 0x1ff}, {0x0, 0x8, 0x9, 0x8}, {0x8, 0x3f, 0xfe, 0xc2f}], {0x7}}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x1}}}, @common=@log={'log\x00', 0x28, {{0x4, "41719f156d5b8b0f5df4b0b27ebc9c01220c540038df4bf41b4614357239", 0xe}}}], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffb}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{0x5, 0x0, 0x6003, 'hsr0\x00', 'veth0_to_team\x00', 'ip_vti0\x00', 'batadv_slave_1\x00', @multicast, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @multicast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xfe, 0xfe, 0x146, [@arp={{'arp\x00', 0x0, 0x38}, {{0x110, 0xfbfb, 0x8, @local, 0xff, @empty, 0xff, @dev={[], 0x3a}, [0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0x2, 0x12}}}, @m802_3={{'802_3\x00', 0x0, 0x8}, {{0x2, 0x9, 0x2, 0x5}}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xf9, 0x7, {0x8d70}}}}}, {0x3, 0x13, 0x8137, 'vlan0\x00', 'batadv_slave_0\x00', 'wg2\x00', 'veth0_virt_wifi\x00', @local, [0xff], @local, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xae, 0xf6, 0x126, [@owner={{'owner\x00', 0x0, 0x18}, {{0x0, 0x0, 0x0, r4, 0x4, 0x1}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"4685f462f7abfea76ecbc70d6d523ceadfdb9a920344489dde82258abe6d"}}], @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x7e8) r9 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r9, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) 13:37:01 executing program 3: r0 = socket$caif_stream(0x25, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000180)=@rc, 0x80, 0x0}, 0x0) [ 607.204496][T18898] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:01 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 13:37:01 executing program 1: mmap$usbfs(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x4185830, 0xffffffffffffffff, 0x0) 13:37:01 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x9102) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xfffffece}, 0x27) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) 13:37:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x2, 0x9, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @private2}}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x0, @multicast1}, @in={0x2, 0x0, @loopback}}]}, 0x78}}, 0x0) 13:37:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @private1={0xfc, 0x1, [], 0x2}, @dev={0xfe, 0x80, [0xb, 0x14, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x2, 0xb, 0x3, 0x14, 0x8], 0x14}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20020002, r2}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x9, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20c200a2, r8}) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2, 0x80000000}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="70000000a486bf19000000000000000000df25802014b983540f6592cdb3000600150000007bce08", @ANYRESHEX=0x0, @ANYBLOB="08000300", @ANYRES16, @ANYRESHEX=r5, @ANYRES32=r3, @ANYBLOB="00b9fcde", @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYBLOB="08000b00290300040038bec50a4c6c2e3bd47642c6e8851eb96263f3e4c76195c47910ec10b8d2ab1b66c3129b729576c16eb0425fb5c0206bc9f6330ab8c07a9d7cfe74c34ac49548dd31d9cea7c777b8403d2bdd3ea8ed93184262e1f367c3f1a37ce772a08a9d6739e88ffb23f6e172db876d4399d45222b24129000000", @ANYRES64=r4, @ANYBLOB="9fcbe3d2472d5f24171b60e68b1a059400692062b342705613b82d3dc19dc0f5ba667f3d337cd74797b63ca94cb030129d7a13ab74803721e77a436496037fca78b1"], 0x70}}, 0x20000001) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x770, [0x0, 0x20000080, 0x200000b0, 0x2000019e], 0x0, &(0x7f0000000000), &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x5, 0x40, 0x800, 'geneve0\x00', 'dummy0\x00', 'bond_slave_1\x00', 'wlan0\x00', @remote, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @random="a4d5947a3aed", [0xff, 0xff, 0xff, 0xff], 0x6e, 0x6e, 0xbe, [], [], @common=@log={'log\x00', 0x28, {{0x2, "f0b07948a5c57c3f38105d31b00c390bcdef1a03b68baec30d5a8d0f6762", 0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{0x11, 0x28, 0x2, 'lo\x00', 'veth0_to_bond\x00', 'wlan1\x00', 'macvtap0\x00', @random="dcab30b4f52d", [0x0, 0x0, 0x0, 0xff], @local, [0x0, 0xff], 0x2d6, 0x356, 0x386, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x4, 0x3, 0x88a8, 0x2, 0xc}}}, @bpf0={{'bpf\x00', 0x0, 0x210}, {{0x34, [{0x3e, 0x6c, 0x32, 0xffffffff}, {0x1, 0x5, 0x6}, {0x80, 0x2, 0x8, 0x8fa}, {0x4, 0x7f, 0x2a, 0xe9}, {0x0, 0x7, 0x2, 0xfffff800}, {0x7b04, 0x1f, 0x5, 0x101}, {0x4, 0x1f, 0x80, 0xfe}, {0x6, 0x0, 0x9, 0xfffffff7}, {0x80, 0x8, 0x3, 0xffffffff}, {0xe3, 0x9, 0x6, 0xff}, {0x9, 0x1f, 0x1, 0x8}, {0xa0, 0x6, 0x4, 0x1ad}, {0xfc01, 0x9, 0xfc, 0x9d}, {0x7, 0xfb, 0x8, 0x8001}, {0x3de, 0x1, 0xa5, 0x20}, {0x7ff, 0x5, 0x0, 0x7}, {0xf4a6, 0x50, 0xe8, 0xffff}, {0x5, 0x8, 0x25, 0x27}, {0x4, 0x57, 0x0, 0xe85}, {0x9, 0x2, 0x0, 0x8}, {0x7f, 0x20, 0x5, 0x7}, {0x3, 0x7, 0x9, 0x9}, {0x0, 0x7f, 0x81, 0x5}, {0xffff, 0x81, 0x3}, {0x9, 0x5, 0x7f}, {0x1f, 0x83, 0xe6, 0x3}, {0x8, 0x6, 0x6, 0x3d38}, {0xfe1, 0xc, 0x0, 0xd13}, {0x4070, 0x9, 0x0, 0x80000000}, {0x6, 0xa9, 0x81, 0x4}, {0x9, 0x2, 0xe4, 0x1}, {0x8, 0x1, 0x1, 0x20}, {0x622, 0x3f, 0x7}, {0x0, 0x80, 0x0, 0x6}, {0x8, 0x1, 0x29, 0x2}, {0x7f, 0x7, 0x5c, 0x5}, {0x800, 0x80, 0x9, 0x40}, {0x8, 0x34, 0x9, 0xffffff87}, {0x5, 0x8, 0x2, 0x3}, {0x5, 0x7, 0x3, 0x3}, {0x99b, 0x81, 0x0, 0x401}, {0x100, 0xfe, 0x6, 0xa60}, {0x3, 0x3, 0x0, 0x7ff}, {0x21c4, 0x81, 0x1, 0xa5}, {0x1f, 0x0, 0x0, 0x10000}, {0xff, 0x6, 0x4, 0x1}, {0x7fff, 0x1, 0xc0, 0x3681}, {0xffff, 0xff, 0x1f, 0x1682}, {0x7, 0x4, 0x8, 0x9}, {0x7, 0x3, 0x7, 0x2}, {0x3, 0xf7, 0x4f, 0x1}, {0x1, 0x1, 0x80, 0xfff}, {0xfc0, 0x2, 0x2, 0x6a8}, {0x6, 0x8b, 0x1f, 0x9}, {0x1, 0x6, 0x6, 0x8}, {0x0, 0x1b, 0x2, 0xadd}, {0x9, 0x0, 0x2, 0x10000}, {0x969, 0x80, 0x3, 0x20}, {0x3f, 0x81, 0x79, 0x80}, {0x1, 0x2, 0x0, 0x3f}, {0x2, 0x80, 0x0, 0x2}, {0x3ff, 0x6, 0x81, 0x1ff}, {0x0, 0x8, 0x9, 0x8}, {0x8, 0x3f, 0xfe, 0xc2f}], {0x7}}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x1}}}, @common=@log={'log\x00', 0x28, {{0x4, "41719f156d5b8b0f5df4b0b27ebc9c01220c540038df4bf41b4614357239", 0xe}}}], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffb}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{0x5, 0x0, 0x6003, 'hsr0\x00', 'veth0_to_team\x00', 'ip_vti0\x00', 'batadv_slave_1\x00', @multicast, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @multicast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xfe, 0xfe, 0x146, [@arp={{'arp\x00', 0x0, 0x38}, {{0x110, 0xfbfb, 0x8, @local, 0xff, @empty, 0xff, @dev={[], 0x3a}, [0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0x2, 0x12}}}, @m802_3={{'802_3\x00', 0x0, 0x8}, {{0x2, 0x9, 0x2, 0x5}}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xf9, 0x7, {0x8d70}}}}}, {0x3, 0x13, 0x8137, 'vlan0\x00', 'batadv_slave_0\x00', 'wg2\x00', 'veth0_virt_wifi\x00', @local, [0xff], @local, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xae, 0xf6, 0x126, [@owner={{'owner\x00', 0x0, 0x18}, {{0x0, 0x0, 0x0, r4, 0x4, 0x1}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"4685f462f7abfea76ecbc70d6d523ceadfdb9a920344489dde82258abe6d"}}], @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x7e8) r9 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r9, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) 13:37:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:37:01 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000140)="240000005a001f00ff03f4f9002304000a04f5110800010002010002080002", 0x1f) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x53f74f64, 0x2) 13:37:02 executing program 1: setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/198, 0xc6) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, 0x0) [ 607.732742][T18916] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 607.797804][T18920] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:02 executing program 5: socket$inet(0x2, 0x3, 0x8) 13:37:02 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0) read$usbmon(r0, &(0x7f0000000080)=""/185, 0xb9) 13:37:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) [ 607.986836][T18931] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:02 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x7000) 13:37:02 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0) read$usbmon(r0, &(0x7f0000000080)=""/185, 0xb9) [ 608.153949][T18942] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:02 executing program 5: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000002540)="0f", 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000003c0)={0x0, r0}, 0x0, 0x0, &(0x7f0000002680)={&(0x7f0000002640)={'sha1\x00'}}) 13:37:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:02 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0) read$usbmon(r0, &(0x7f0000000080)=""/185, 0xb9) [ 608.473938][T18952] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:02 executing program 5: add_key$fscrypt_provisioning(&(0x7f00000020c0)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 13:37:02 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000140)="240000005a001f00ff03f4f9002304000a04f5110800010002010002080002", 0x1f) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x53f74f64, 0x2) [ 608.714741][T18960] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:03 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2000}) 13:37:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:03 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0) read$usbmon(r0, &(0x7f0000000080)=""/185, 0xb9) 13:37:03 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x40010, r0, 0x0) 13:37:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x9, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20c200a2, r3}) 13:37:03 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x5, 0x2, 0x0, "341280e3f1a83fe6b9f09679041dde0087d3b4214f75b2e8e2b640d05dbafca2"}) [ 609.042270][T18976] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:03 executing program 3: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x2, &(0x7f0000ffb000/0x4000)=nil) 13:37:03 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2000}) 13:37:03 executing program 5: socketpair(0x2b, 0x1, 0x20009, &(0x7f0000000000)) 13:37:03 executing program 0: shmctl$IPC_SET(0x0, 0x2, &(0x7f0000000040)={{0x0}}) [ 609.405805][T18993] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:03 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000140)="240000005a001f00ff03f4f9002304000a04f5110800010002010002080002", 0x1f) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x53f74f64, 0x2) 13:37:03 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2000}) 13:37:03 executing program 3: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x582) 13:37:03 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000080)={{0x3, @null}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) 13:37:03 executing program 0: mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4) 13:37:04 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x40002) 13:37:04 executing program 3: syz_open_dev$usbmon(&(0x7f00000020c0)='/dev/usbmon#\x00', 0x0, 0x616802) 13:37:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:04 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2000}) 13:37:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5}, 0x40) [ 610.041412][T19019] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2000000, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)) 13:37:04 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f00000025c0)='/dev/fuse\x00', 0x2, 0x0) [ 610.301050][T19025] loop0: detected capacity change from 65536 to 0 [ 610.408202][T19025] XFS (loop0): Invalid superblock magic number 13:37:04 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000140)="240000005a001f00ff03f4f9002304000a04f5110800010002010002080002", 0x1f) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x53f74f64, 0x2) 13:37:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000340)={[{@quiet='quiet'}]}) 13:37:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001380)={0xd}, 0x40) 13:37:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x0, 'syz1\x00', @default, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @default, @bcast, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) 13:37:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:04 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x1000}, 0x4) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20001732, &(0x7f0000000240)={0x2, 0x4e20, @local}, 0x10) 13:37:05 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, &(0x7f0000000040)="ef", 0x1, 0x488c0, &(0x7f0000000080)={0xa, 0x0, 0x28f6, @loopback, 0xee0}, 0x20) 13:37:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0xc0045878, 0x0) [ 610.856927][T19047] hfs: can't find a HFS filesystem on dev loop1 [ 610.867132][T19054] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x1000}, 0x4) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20001732, &(0x7f0000000240)={0x2, 0x4e20, @local}, 0x10) 13:37:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000340)={[{@quiet='quiet'}]}) 13:37:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@ptr={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000340)=""/210, 0x27, 0xd2, 0x1}, 0x20) 13:37:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x0, 0x0, 0x3}, 0x40) [ 611.308345][T19067] hfs: can't find a HFS filesystem on dev loop1 13:37:05 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) 13:37:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x1000}, 0x4) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20001732, &(0x7f0000000240)={0x2, 0x4e20, @local}, 0x10) 13:37:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000340)={[{@quiet='quiet'}]}) 13:37:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:05 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000002080)='ns/cgroup\x00') [ 611.827269][T19087] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x1000}, 0x4) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20001732, &(0x7f0000000240)={0x2, 0x4e20, @local}, 0x10) [ 611.894022][T19093] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 611.925895][T19090] hfs: can't find a HFS filesystem on dev loop1 [ 611.938389][T19095] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:06 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') 13:37:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:06 executing program 4: mremap(&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x1000, 0x7, &(0x7f0000ff2000/0x1000)=nil) 13:37:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000340)={[{@quiet='quiet'}]}) 13:37:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000003100)={&(0x7f0000000180)=@in6={0xa, 0x4e20, 0x0, @mcast1, 0xffffff80}, 0x80, 0x0, 0x0, &(0x7f00000030c0)=[@txtime={{0x18}}], 0x18}, 0x0) 13:37:06 executing program 3: socketpair(0xa, 0x0, 0x7fff, &(0x7f0000001640)) [ 612.390360][T19108] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 612.493275][T19111] hfs: can't find a HFS filesystem on dev loop1 13:37:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:06 executing program 4: mremap(&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x1000, 0x7, &(0x7f0000ff2000/0x1000)=nil) 13:37:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:06 executing program 0: munlockall() bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 13:37:07 executing program 1: socketpair(0x22, 0x0, 0x8, &(0x7f0000000580)) 13:37:07 executing program 3: mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) 13:37:07 executing program 4: mremap(&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x1000, 0x7, &(0x7f0000ff2000/0x1000)=nil) [ 612.812049][T19124] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 612.852503][T19127] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:07 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) 13:37:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:07 executing program 4: mremap(&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x1000, 0x7, &(0x7f0000ff2000/0x1000)=nil) 13:37:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000000140)={[{@locktable={'locktable', 0x3d, '\\(\\$\xe9\\Z#_\xe2f\xf9\xa0{\x8f8=\xc5 \xfa\x1f\xd0W\xf3#\x8d\xa8'}}]}) [ 613.019299][T19133] team0: Device vlan2 is already an upper device of the team interface 13:37:07 executing program 1: socketpair(0xa, 0x3, 0xa3, &(0x7f0000000000)) [ 613.189765][T19142] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, 0x0, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bpq0='bpq0\x00', 0x0, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x0, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast]}) 13:37:07 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup3(r1, r0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000240)=0x4) [ 613.365686][T19146] gfs2: not a GFS2 filesystem [ 613.505783][T19157] sctp: [Deprecated]: syz-executor.5 (pid 19157) Use of int in maxseg socket option. [ 613.505783][T19157] Use struct sctp_assoc_value instead [ 613.891267][T19161] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 613.921709][T19164] team0: Device vlan2 is already an upper device of the team interface 13:37:08 executing program 0: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000100), 0x0) syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0x2, 0x4, &(0x7f0000000a00)=[{&(0x7f0000000480)="408038e98755c7fa116054249459ecf26691", 0x12}, {0x0, 0x0, 0x3}, {&(0x7f0000000740)}, {0x0}], 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000300)=""/47, &(0x7f0000000340)=0x2f) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) 13:37:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) 13:37:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002740)={&(0x7f0000000100)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00', 0xfff}, 0x1c, 0x0, 0x0, &(0x7f0000002500)=[@rthdr_2292={{0x18}}], 0x18}, 0x0) 13:37:08 executing program 3: mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x1, 0x0) 13:37:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, 0x0, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:08 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) 13:37:08 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xffffffffffffffef, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setresgid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='wchan\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0, 0x0) 13:37:08 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffff001, 0x80040) 13:37:08 executing program 5: shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000040)={{0x0}}) 13:37:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) poll(&(0x7f00000001c0)=[{r2}], 0x1, 0x200) [ 614.437146][T19184] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, 0x0, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:08 executing program 5: shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000040)={{0x0}}) 13:37:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc48739", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:37:09 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, 0x0) 13:37:09 executing program 5: shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000040)={{0x0}}) [ 614.862203][T19207] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:09 executing program 1: shmctl$IPC_SET(0x0, 0x2, &(0x7f0000000140)={{0x2, 0xffffffffffffffff, 0x0, 0x0, 0xee01}}) 13:37:09 executing program 5: shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000040)={{0x0}}) 13:37:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(0xffffffffffffffff, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:09 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xffffffffffffffef, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setresgid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='wchan\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0, 0x0) 13:37:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x678, 0x1}, 0x40) 13:37:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) poll(&(0x7f00000001c0)=[{r2}], 0x1, 0x200) 13:37:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x4, 0x0, @remote={0xac, 0x13}, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) [ 615.399007][T19232] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001bc0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes)\x00'}, 0x58) 13:37:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(0xffffffffffffffff, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 615.749697][T19247] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc48739", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:37:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x3}, 0x40) 13:37:12 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xffffffffffffffef, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setresgid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='wchan\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0, 0x0) 13:37:12 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, &(0x7f0000000080)={0x0, @sco={0x1f, @none}, @generic={0x0, "999c615dc982b36e4639b9ffb6a8"}, @hci}) 13:37:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(0xffffffffffffffff, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) poll(&(0x7f00000001c0)=[{r2}], 0x1, 0x200) 13:37:12 executing program 1: remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 13:37:12 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xffffffffffffffef, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setresgid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='wchan\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0, 0x0) 13:37:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000005840)={&(0x7f0000002300)={0xa, 0x4e21, 0x0, @mcast2, 0x5}, 0x1c, 0x0, 0x0, &(0x7f0000004740)=[@hoplimit_2292={{0x14}}, @tclass={{0x14, 0x29, 0x43, 0x80000000}}], 0x30}, 0x0) [ 618.252738][T19266] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:12 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x4020940d, 0x0) 13:37:12 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local}, {{0x0, 0xce21, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 13:37:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={0x0, &(0x7f0000000200)=""/4096, 0x0, 0x1000}, 0x20) 13:37:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc48739", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:37:15 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0x0) 13:37:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000280)={[{@meta='meta'}]}) 13:37:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) poll(&(0x7f00000001c0)=[{r2}], 0x1, 0x200) 13:37:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, 0x0, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:15 executing program 5: io_setup(0x1000, &(0x7f0000000000)=0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000180)={0x0, 0x3938700}) 13:37:15 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') [ 621.364353][T19306] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 621.370050][T19303] gfs2: not a GFS2 filesystem 13:37:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000280)={[{@meta='meta'}]}) 13:37:15 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x1002c0, 0x0) 13:37:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xf}, 0x3) 13:37:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, 0x0, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:16 executing program 5: pkey_mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x200000d, 0xffffffffffffffff) [ 621.727090][T19320] gfs2: not a GFS2 filesystem [ 621.963232][T19331] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc48739", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:37:18 executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 13:37:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000280)={[{@meta='meta'}]}) 13:37:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x0, 0x205}, 0x20) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x600004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 13:37:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@init_itable='init_itable'}, {@min_batch_time={'min_batch_time'}}]}) 13:37:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, 0x0, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 624.477393][T19351] loop5: detected capacity change from 4 to 0 [ 624.511304][T19348] gfs2: not a GFS2 filesystem [ 624.517541][T19357] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000280)={[{@meta='meta'}]}) [ 624.575663][T19351] EXT4-fs (loop5): Can't read superblock on 2nd try [ 624.632921][T19351] loop5: detected capacity change from 4 to 0 13:37:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040), r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 624.705463][T19351] EXT4-fs (loop5): Can't read superblock on 2nd try [ 624.715693][ T34] audit: type=1800 audit(1608903438.967:219): pid=19356 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16360 res=0 errno=0 13:37:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x0, 0x205}, 0x20) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x600004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 13:37:19 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000440)={0xa, 0x0, 0x0, @dev, 0x4000}, 0x20) 13:37:19 executing program 5: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) [ 624.920568][T19373] gfs2: not a GFS2 filesystem 13:37:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x24004094, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x20) 13:37:19 executing program 0: r0 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0xfffffffffffffffe) [ 625.088151][T19387] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:19 executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 13:37:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:37:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x0, 0x205}, 0x20) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x600004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 13:37:19 executing program 3: bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000002540)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffce}, 0x48) 13:37:19 executing program 0: mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 13:37:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040), r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:19 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dlm_plock\x00', 0x28402, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) 13:37:19 executing program 3: bpf$BPF_PROG_TEST_RUN(0x6, 0x0, 0x0) 13:37:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x4}]}}, &(0x7f0000000340)=""/210, 0x26, 0xd2, 0x1}, 0x20) [ 625.734436][T19408] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x0, 0x205}, 0x20) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x600004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 13:37:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040), r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:20 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) [ 626.097683][T19425] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:20 executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 13:37:20 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000280)=@v2={0x2000000, [{}, {0x0, 0x7f}]}, 0x14, 0x1) 13:37:20 executing program 0: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7f, 0x0) 13:37:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000005440)=[{{0x0, 0xfffffffffffffcfb, 0x0}}], 0xfb93a852dd518c, 0x0) 13:37:20 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:37:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, 0xffffffffffffffff, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:20 executing program 4: socketpair(0x9, 0x0, 0x0, &(0x7f0000000040)) [ 626.563931][T19438] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000140)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000240), 0x94) 13:37:20 executing program 0: mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 13:37:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, 0xffffffffffffffff, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f00000015c0)={[{@session={'session'}}]}) socket$pppoe(0x18, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:37:21 executing program 0: remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000c, 0x0, 0x0) [ 626.937183][T19455] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 627.081070][T19458] hfsplus: unable to find HFS+ superblock [ 627.149777][T19463] hfsplus: unable to find HFS+ superblock 13:37:21 executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 13:37:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, 0xffffffffffffffff, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:21 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000140)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 13:37:21 executing program 3: mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000480)=0x7ff, 0x7, 0x0) 13:37:21 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000000c0)) 13:37:21 executing program 5: socketpair(0x2c, 0x3, 0xf001, &(0x7f0000000300)) 13:37:21 executing program 4: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000440)={0x0, &(0x7f0000000340)=""/210, 0x0, 0xd2}, 0x20) 13:37:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0x10, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8}]}}}]}, 0x3c}}, 0x0) 13:37:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000340)=""/210, 0x1b, 0xd2, 0x1}, 0x20) [ 627.619698][T19483] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:22 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000040)={0x0, 0x81, 0x4, {0x1, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}) [ 627.784450][T19492] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops 13:37:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @private1={0xfc, 0x1, [], 0x2}, @dev={0xfe, 0x80, [0xb, 0x14, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x2, 0xb, 0x3, 0x14, 0x8], 0x14}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20020002, r2}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x9, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2, 0x80000000}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="70000000a486bf19000000000000000000df25802014b983540f6592cdb3000600150000007bce08", @ANYRESHEX=0x0, @ANYBLOB="08000300", @ANYRES16, @ANYRESHEX=r5, @ANYRES32=r3, @ANYBLOB="00b9fcde", @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYBLOB="08000b00290300040038bec50a4c6c2e3bd47642c6e8851eb96263f3e4c76195c47910ec10b8d2ab1b66c3129b729576c16eb0425fb5c0206bc9f6330ab8c07a9d7cfe74c34ac49548dd31d9cea7c777b8403d2bdd3ea8ed93184262e1f367c3f1a37ce772a08a9d6739e88ffb23f6e172db876d4399d45222b24129000000", @ANYRES64=r4, @ANYBLOB="9fcbe3d2472d5f24171b60e68b1a059400692062b342705613b82d3dc19dc0f5ba667f3d337cd74797b63ca94cb030129d7a13ab74803721e77a436496037fca78b1719ff1d397ffdf1d04ba829de2d3c0435d14c69c00"], 0x70}}, 0x20000001) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x770, [0x0, 0x20000080, 0x200000b0, 0x2000019e], 0x0, &(0x7f0000000000), &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x5, 0x40, 0x800, 'geneve0\x00', 'dummy0\x00', 'bond_slave_1\x00', 'wlan0\x00', @remote, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @random="a4d5947a3aed", [0xff, 0xff, 0xff, 0xff], 0x6e, 0x6e, 0xbe, [], [], @common=@log={'log\x00', 0x28, {{0x2, "f0b07948a5c57c3f38105d31b00c390bcdef1a03b68baec30d5a8d0f6762", 0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{0x11, 0x28, 0x2, 'lo\x00', 'veth0_to_bond\x00', 'wlan1\x00', 'macvtap0\x00', @random="dcab30b4f52d", [0x0, 0x0, 0x0, 0xff], @local, [0x0, 0xff], 0x2d6, 0x356, 0x386, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x4, 0x3, 0x88a8, 0x2, 0xc}}}, @bpf0={{'bpf\x00', 0x0, 0x210}, {{0x34, [{0x3e, 0x6c, 0x32, 0xffffffff}, {0x1, 0x5, 0x6}, {0x80, 0x2, 0x8, 0x8fa}, {0x4, 0x7f, 0x2a, 0xe9}, {0x0, 0x7, 0x2, 0xfffff800}, {0x7b04, 0x1f, 0x5, 0x101}, {0x4, 0x1f, 0x80, 0xfe}, {0x6, 0x0, 0x9, 0xfffffff7}, {0x80, 0x8, 0x3, 0xffffffff}, {0xe3, 0x9, 0x6, 0xff}, {0x9, 0x1f, 0x1, 0x8}, {0xa0, 0x6, 0x4, 0x1ad}, {0xfc01, 0x9, 0xfc, 0x9d}, {0x7, 0xfb, 0x8, 0x8001}, {0x3de, 0x1, 0xa5, 0x20}, {0x7ff, 0x5, 0x0, 0x7}, {0xf4a6, 0x50, 0xe8, 0xffff}, {0x5, 0x8, 0x25, 0x27}, {0x4, 0x57, 0x0, 0xe85}, {0x9, 0x2, 0x0, 0x8}, {0x7f, 0x20, 0x5, 0x7}, {0x3, 0x7, 0x9, 0x9}, {0x0, 0x7f, 0x81, 0x5}, {0xffff, 0x81, 0x3}, {0x9, 0x5, 0x7f}, {0x1f, 0x83, 0xe6, 0x3}, {0x8, 0x6, 0x6, 0x3d38}, {0xfe1, 0xc, 0x0, 0xd13}, {0x4070, 0x9, 0x0, 0x80000000}, {0x6, 0xa9, 0x81, 0x4}, {0x9, 0x2, 0xe4, 0x1}, {0x8, 0x1, 0x1, 0x20}, {0x622, 0x3f, 0x7}, {0x0, 0x80, 0x0, 0x6}, {0x8, 0x1, 0x29, 0x2}, {0x7f, 0x7, 0x5c, 0x5}, {0x800, 0x80, 0x9, 0x40}, {0x8, 0x34, 0x9, 0xffffff87}, {0x5, 0x8, 0x2, 0x3}, {0x5, 0x7, 0x3, 0x3}, {0x99b, 0x81, 0xfa, 0x401}, {0x100, 0xfe, 0x6, 0xa60}, {0x3, 0x3, 0x0, 0x7ff}, {0x21c4, 0x81, 0x1, 0xa5}, {0x1f, 0x0, 0x0, 0x10000}, {0xff, 0x6, 0x4, 0x1}, {0x7fff, 0x1, 0xc0, 0x3681}, {0xffff, 0xff, 0x1f, 0x1682}, {0x7, 0x4, 0x8, 0x9}, {0x7, 0x3, 0x7, 0x2}, {0x3, 0xf7, 0x4f, 0x1}, {0x1, 0x1, 0x80, 0xfff}, {0xfc0, 0x2, 0x2, 0x6a8}, {0x6, 0x8b, 0x1f, 0x9}, {0x1, 0x6, 0x6, 0x8}, {0x0, 0x1b, 0x2, 0xadd}, {0x9, 0x0, 0x2, 0x10000}, {0x969, 0x80, 0x3, 0x20}, {0x3f, 0x81, 0x79, 0x80}, {0x1, 0x2, 0x0, 0x3f}, {0x2, 0x80, 0x0, 0x2}, {0x3ff, 0x6, 0x81, 0x1ff}, {0x0, 0x8, 0x9, 0x8}, {0x8, 0x3f, 0xfe, 0xc2f}], {0x7}}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x1}}}, @common=@log={'log\x00', 0x28, {{0x4, "41719f156d5b8b0f5df4b0b27ebc9c01220c540038df4bf41b4614357239", 0xe}}}], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffb}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{0x5, 0x0, 0x6003, 'hsr0\x00', 'veth0_to_team\x00', 'ip_vti0\x00', 'batadv_slave_1\x00', @multicast, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @multicast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xfe, 0xfe, 0x146, [@arp={{'arp\x00', 0x0, 0x38}, {{0x110, 0xfbfb, 0x8, @local, 0xff, @empty, 0xff, @dev={[], 0x3a}, [0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0x2, 0x12}}}, @m802_3={{'802_3\x00', 0x0, 0x8}, {{0x2, 0x9, 0x2, 0x5}}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xf9, 0x7, {0x8d70}}}}}, {0x3, 0x13, 0x8137, 'vlan0\x00', 'batadv_slave_0\x00', 'wg2\x00', 'veth0_virt_wifi\x00', @local, [0xff, 0x0, 0x0, 0x0, 0xff], @local, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xae, 0xf6, 0x126, [@owner={{'owner\x00', 0x0, 0x18}, {{0x0, 0x0, 0x0, r4, 0x4, 0x1}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"4685f462f7abfea76ecbc70d6d523ceadfdb9a920344489dde82258abe6d"}}], @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x7e8) r9 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r9, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) 13:37:22 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:37:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, 0x0, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 628.295673][T19508] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, 0x0, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0x10, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8}]}}}]}, 0x3c}}, 0x0) 13:37:22 executing program 3: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x0}}) 13:37:22 executing program 4: bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000002540)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffce}, 0x48) 13:37:22 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000040)={0x0, 0x81, 0x0, {0x1, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}) 13:37:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x40000, 0x0, 0x1}, 0x40) 13:37:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002740)={&(0x7f0000000100)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0}, 0x0) 13:37:23 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x89a0, &(0x7f0000000080)={0x0, @sco={0x1f, @none}, @generic={0x0, "999c615dc982b36e4639b9ffb6a8"}, @hci}) [ 628.650970][T19518] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 628.685015][T19522] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:23 executing program 5: bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000002540)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffce}, 0x48) 13:37:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0x10, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8}]}}}]}, 0x3c}}, 0x0) 13:37:23 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x2, 0xffffffffffffffff, 0x0, 0x0, 0xee01}}) 13:37:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, 0x0, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="240000002e00310f00"/19, @ANYRES32=r3], 0x24}}, 0x0) 13:37:23 executing program 5: socketpair(0x2b, 0x0, 0x0, &(0x7f00000003c0)) [ 628.956924][T19533] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops 13:37:23 executing program 3: bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000002540)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffce}, 0x48) 13:37:23 executing program 1: socketpair(0x29, 0x2, 0x3f, &(0x7f00000019c0)) 13:37:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0x10, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8}]}}}]}, 0x3c}}, 0x0) [ 629.010246][T19535] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0), 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:23 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xf, 0x0, 0x0, 0xffffffff}, 0x40) 13:37:23 executing program 3: socketpair(0xf, 0x0, 0x0, &(0x7f0000002b00)) [ 629.212633][T19544] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 13:37:23 executing program 1: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x804000) [ 629.291468][T19545] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 629.315560][T19548] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 13:37:23 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000440)={0x0, &(0x7f0000000340)=""/210, 0x0, 0xd2}, 0x20) [ 629.415138][T19561] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:23 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvfrom$l2tp6(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 13:37:23 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0xc0189436, 0x0) 13:37:23 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) 13:37:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/210, 0x1a, 0xd2, 0x1}, 0x20) 13:37:23 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="680100001000010400"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="35458ac53b3410f5d80370b65e4e0060a95923fd616eaca19273b6aa2e52d0d660ca73ad84ba4c1d099ae4b19bcd68ee7b2b10191eae7f6a64babaa81faf3f72a5742083bf2d745fae3e5fe1bb765cc0ea3ed911cb16cd279e87b5aef54a55c42245e2e82b4bf1f64c1fd85fa1caa8f1ffa96159af0f7a62e3b08f3caf9431a30112357e6cf2d0c012ec161f7b2aa364f8660069a6a8724c6d6aee087f27f62bb9ce322f92acbbf3683dc9821f73"], 0x168}}, 0x8000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 13:37:24 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:37:24 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0xc0189436, &(0x7f0000000080)={0x0, @sco={0x1f, @none}, @generic={0x0, "999c615dc982b36e4639b9ffb6a8"}, @hci}) 13:37:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0), 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000005840)={&(0x7f0000002300)={0xa, 0x4e21, 0x0, @mcast2, 0x5}, 0x1c, 0x0, 0x0, &(0x7f0000004740)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x7}}, @tclass={{0x14}}], 0x30}, 0x4800) 13:37:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="1b9b073b3130090066"], 0x40) 13:37:24 executing program 4: prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffd000/0x1000)=nil) [ 629.951206][T19581] bridge0: port 3(vlan2) entered blocking state [ 629.975211][T19581] bridge0: port 3(vlan2) entered disabled state 13:37:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4001, &(0x7f0000000300)={[{@inode32='inode32'}, {@bsdgroups='bsdgroups'}], [{@obj_type={'obj_type', 0x3d, 'syz0\x00'}}]}) 13:37:24 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@mark={{0x14}}], 0x18}, 0x0) 13:37:24 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x40084503, 0x0) 13:37:24 executing program 4: r0 = getpgid(0x0) r1 = getpgid(0x0) rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000340)) [ 630.224377][T19600] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:24 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') [ 630.282473][T19601] xfs: Unknown parameter 'obj_type' 13:37:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)={[{@attr2='attr2'}, {@discard='discard'}]}) 13:37:24 executing program 0: prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000ffc000/0x2000)=nil) 13:37:24 executing program 5: syz_mount_image$gfs2(&(0x7f00000002c0)='gfs2\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0, 0x0, 0x4c2}], 0x0, &(0x7f0000000080)) 13:37:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0), 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:24 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 13:37:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000000)={[{@norecovery='norecovery'}]}) 13:37:25 executing program 0: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220407b5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) [ 630.715504][T19623] loop5: detected capacity change from 4 to 0 [ 630.754126][T19628] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 630.768096][T19623] attempt to access beyond end of device [ 630.768096][T19623] loop5: rw=4096, want=136, limit=4 13:37:25 executing program 4: socketpair(0x18, 0x0, 0x81, &(0x7f0000000000)) 13:37:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x0, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 630.828977][T19623] gfs2: error 10 reading superblock [ 630.843673][T19631] gfs2: not a GFS2 filesystem [ 630.851540][T19626] XFS: attr2 mount option is deprecated. [ 630.898135][T19623] loop5: detected capacity change from 4 to 0 [ 630.951154][T19626] XFS (loop3): Invalid superblock magic number [ 630.958904][T19623] attempt to access beyond end of device [ 630.958904][T19623] loop5: rw=4096, want=136, limit=4 [ 631.043098][T19623] gfs2: error 10 reading superblock 13:37:25 executing program 1: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000180)={0x0, 'vlan0\x00', {0x4}}) [ 631.144427][T19654] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x8, 0x67, 0x0, 0x0, [0x0]}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:25 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000040)={0x0, 0x81, 0x4, {0x1, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}) 13:37:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)={[{@attr2='attr2'}, {@discard='discard'}]}) 13:37:25 executing program 0: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220407b5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) [ 631.502214][T19664] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:25 executing program 0: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220407b5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) 13:37:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f0000000140)=0x2, 0x8b, 0x2, 0x0, &(0x7f00000001c0), 0x0) 13:37:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/210, 0x1a, 0xd2, 0x1}, 0x20) [ 631.615695][T19670] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x0, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 631.734222][T19672] XFS: attr2 mount option is deprecated. 13:37:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f00000000c0)) 13:37:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x1fe, 0x0, 0x0, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) [ 631.946384][T19672] XFS (loop3): Invalid superblock magic number 13:37:26 executing program 0: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220407b5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) 13:37:26 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, r0, 0x0) [ 632.103549][T19693] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)={[{@attr2='attr2'}, {@discard='discard'}]}) 13:37:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000500)={0x0, 0x0, 0x0}) 13:37:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:37:26 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, &(0x7f0000000040)) 13:37:26 executing program 4: bpf$BPF_PROG_TEST_RUN(0xe, 0x0, 0x0) 13:37:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xf, 0x0, 0x0, 0x3}, 0x40) [ 632.661240][T19712] XFS: attr2 mount option is deprecated. 13:37:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="1b9b073b3130090072"], 0x40) [ 632.749441][T19712] XFS (loop3): Invalid superblock magic number 13:37:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x0, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:27 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0xc020660b, 0x0) 13:37:27 executing program 4: bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000002540)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:37:27 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 13:37:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x4, 0x0, 0x3}, 0x40) 13:37:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)={[{@attr2='attr2'}, {@discard='discard'}]}) 13:37:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="1b9b073b3130090072"], 0x40) 13:37:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) [ 633.153231][T19740] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xf}, 0x40) 13:37:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 13:37:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="1b9b073b3130090072"], 0x40) [ 633.449355][T19750] XFS: attr2 mount option is deprecated. 13:37:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:27 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000200)={0x0, 0x0}) 13:37:27 executing program 1: setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) [ 633.579727][T19750] XFS (loop3): Invalid superblock magic number 13:37:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) 13:37:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="1b9b073b3130090072"], 0x40) [ 633.757120][T19770] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:28 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000440)={0xa, 0x0, 0x0, @empty}, 0x20) 13:37:28 executing program 5: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) 13:37:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8, 0x3}]}}}]}, 0x3c}}, 0x0) 13:37:28 executing program 3: write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100)='FROZEN\x00', 0x7) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x6000) 13:37:28 executing program 5: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x10) 13:37:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 634.200810][T19792] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 634.296867][T19796] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops 13:37:28 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x0, 0x0) mmap$perf(&(0x7f0000800000/0x800000)=nil, 0x800000, 0xa, 0x12, r0, 0x0) 13:37:28 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000003b40)) 13:37:28 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000200)={0x0, 0x0}) [ 634.496344][T19803] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:28 executing program 1: bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000002540)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffce}, 0x48) 13:37:28 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$romfs(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000002200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 13:37:28 executing program 3: socketpair(0x15, 0x5, 0x0, &(0x7f0000000300)) 13:37:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x10}, 0x40) 13:37:29 executing program 3: socketpair(0x15, 0x5, 0x0, &(0x7f0000000300)) 13:37:29 executing program 0: dup(0xffffffffffffffff) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000100)) fchmod(r0, 0x0) 13:37:29 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) renameat2(r3, &(0x7f00000001c0)='./file1\x00', r3, &(0x7f0000000100)='./file0\x00', 0x0) 13:37:29 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000002400), &(0x7f0000002440)=0x4) 13:37:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:29 executing program 3: socketpair(0x15, 0x5, 0x0, &(0x7f0000000300)) [ 635.046412][T19825] loop0: detected capacity change from 264192 to 0 [ 635.113361][T19825] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 635.134457][T19830] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12}, 0x40) 13:37:29 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000200)={0x0, 0x0}) 13:37:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) 13:37:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0xf, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000340)=""/210, 0x26, 0xd2, 0x1}, 0x20) 13:37:29 executing program 3: socketpair(0x15, 0x5, 0x0, &(0x7f0000000300)) 13:37:29 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x4020940d, &(0x7f0000000080)={0x0, @sco={0x1f, @none}, @generic={0x0, "999c615dc982b36e4639b9ffb6a8"}, @hci}) [ 635.517635][T19835] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 13:37:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x12, 0x0, 0x0, 0x1}, 0x40) 13:37:29 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) renameat2(r3, &(0x7f00000001c0)='./file1\x00', r3, &(0x7f0000000100)='./file0\x00', 0x0) 13:37:29 executing program 0: madvise(&(0x7f0000fec000/0x2000)=nil, 0x2000, 0x15) 13:37:30 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8907, 0x0) [ 635.675875][T19855] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev={[], 0x2c}, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000017c0)={'syztnl0\x00', 0x0}) 13:37:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty, 0x2ab9}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@dontfrag={{0x14}}], 0x18}, 0x4048041) [ 636.029391][T19866] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:30 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000200)={0x0, 0x0}) 13:37:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) 13:37:30 executing program 0: syz_mount_image$gfs2(&(0x7f00000002c0)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f00000000c0)={[{@statfs_percent={'statfs_percent'}}]}) 13:37:30 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x1) 13:37:30 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @sco={0x1f, @none}, @generic={0x0, "999c615dc982b36e4639b9ffb6a8"}, @hci}) 13:37:30 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) renameat2(r3, &(0x7f00000001c0)='./file1\x00', r3, &(0x7f0000000100)='./file0\x00', 0x0) 13:37:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@dontfrag={{0x14}}], 0x18}, 0x0) 13:37:30 executing program 1: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) connect$caif(r0, &(0x7f0000000040)=@dbg, 0x18) [ 636.612770][T19889] gfs2: not a GFS2 filesystem [ 636.624001][T19893] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 636.720496][T19889] gfs2: not a GFS2 filesystem 13:37:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) open(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000005440)=[{{0x0, 0xfffffffffffffcfb, 0x0}}], 0xfb93a852dd518c, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 13:37:31 executing program 1: recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x5edf7e6ac99de8c6) 13:37:31 executing program 3: bpf$BPF_PROG_TEST_RUN(0x3, 0x0, 0x0) 13:37:31 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) renameat2(r3, &(0x7f00000001c0)='./file1\x00', r3, &(0x7f0000000100)='./file0\x00', 0x0) 13:37:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/210, 0x1a, 0xd2, 0x1}, 0x20) 13:37:31 executing program 3: socketpair(0x1, 0x0, 0x6, &(0x7f0000000180)) 13:37:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8}]}}}]}, 0x3c}}, 0x0) 13:37:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) 13:37:31 executing program 4: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xf) 13:37:31 executing program 3: add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) [ 637.596266][T19921] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops 13:37:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000003100)={&(0x7f0000000180)=@in6={0xa, 0x4e20, 0x0, @mcast1, 0xffffff80}, 0x80, 0x0}, 0x0) [ 637.638396][T19925] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 637.678498][T19928] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) open(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000005440)=[{{0x0, 0xfffffffffffffcfb, 0x0}}], 0xfb93a852dd518c, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 13:37:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8}]}}}]}, 0x3c}}, 0x0) 13:37:32 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000280)={0x0, 0x0, 0x2}) [ 637.877416][T19934] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) [ 637.979902][T19937] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops 13:37:32 executing program 5: setxattr$trusted_overlay_redirect(0x0, 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) 13:37:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8}]}}}]}, 0x3c}}, 0x0) 13:37:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, 0x0, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:32 executing program 4: socketpair(0x2, 0x0, 0x3ff, &(0x7f0000000000)) [ 638.343935][T19953] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 638.455024][T19958] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8}]}}}]}, 0x3c}}, 0x0) 13:37:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, 0x0, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x11, 0x4, 0x0, 0x3}, 0x40) [ 638.759866][T19965] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 638.850555][T19968] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:33 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x89a0, 0x0) 13:37:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) open(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000005440)=[{{0x0, 0xfffffffffffffcfb, 0x0}}], 0xfb93a852dd518c, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 13:37:33 executing program 1: setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/198, 0xc6) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000300)=""/47, &(0x7f0000000340)=0x2f) 13:37:33 executing program 3: r0 = socket$caif_stream(0x25, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 13:37:33 executing program 5: setxattr$trusted_overlay_redirect(0x0, 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) 13:37:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0xf, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/210, 0x1a, 0xd2, 0x1}, 0x20) 13:37:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080), 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in=@local, @in6=@ipv4}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0xe8) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/210, 0x1a, 0xd2, 0x1}, 0x20) 13:37:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, 0x0, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 639.633912][T19996] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080), 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in=@local, @in6=@ipv4}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0xe8) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/210, 0x1a, 0xd2, 0x1}, 0x20) 13:37:34 executing program 5: setxattr$trusted_overlay_redirect(0x0, 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) [ 639.777517][T20002] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1c}, 0x40) [ 639.900123][T20006] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) open(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000005440)=[{{0x0, 0xfffffffffffffcfb, 0x0}}], 0xfb93a852dd518c, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 13:37:34 executing program 1: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000080)={[{@errors_withdraw='errors=withdraw'}]}) 13:37:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080), 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in=@local, @in6=@ipv4}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0xe8) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000003100)={&(0x7f0000000180)=@in6={0xa, 0x4e20, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 640.273546][T20021] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x10, 0x4, 0x0, 0x800}, 0x40) [ 640.350717][T20025] gfs2: not a GFS2 filesystem 13:37:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:34 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000000)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) 13:37:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080), 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in=@local, @in6=@ipv4}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0xe8) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sigaltstack(&(0x7f0000735000/0x1000)=nil, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) [ 640.800301][T20036] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 640.893356][T20040] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:35 executing program 5: setxattr$trusted_overlay_redirect(0x0, 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) 13:37:35 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000000)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) 13:37:35 executing program 3: socketpair(0x22, 0x0, 0x0, &(0x7f0000000580)) 13:37:35 executing program 1: bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000002540)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffce}, 0x48) 13:37:35 executing program 0: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2800006) 13:37:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x3}, 0x40) 13:37:35 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000000)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) 13:37:35 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000280)={0x0}) 13:37:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x12, 0xfffffe01, 0x0, 0x1}, 0x40) [ 641.426011][T20059] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:35 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220407b5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) 13:37:35 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000380)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 13:37:36 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r2, r0) 13:37:35 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000000)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) [ 641.783251][T20079] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:36 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r0, 0xab05) 13:37:36 executing program 3: setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000340)) 13:37:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000000)={0x281}) 13:37:36 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r2, r0) 13:37:36 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r0, 0xab05) 13:37:36 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x2, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 13:37:36 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r2, r0) 13:37:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280), 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:36 executing program 0: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000200)) 13:37:36 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r0, 0xab05) 13:37:37 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r2, r0) 13:37:37 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x2, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 13:37:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80200, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 642.881364][T20127] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:37 executing program 3: setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000340)) 13:37:37 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r0, 0xab05) 13:37:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000340)=""/210, 0x26, 0xd2, 0x1}, 0x20) 13:37:37 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x2, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 13:37:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x13}, @local, {[@timestamp={0x44, 0x4, 0x67}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:37:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 643.515008][T20147] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:37:37 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001fc0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001fc0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r2, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) close(r1) 13:37:37 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x2, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 13:37:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280), 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:38 executing program 4: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x0) 13:37:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:37:38 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000000)=0x1, 0x4) [ 643.939414][T20160] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:38 executing program 3: setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000340)) 13:37:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001fc0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001fc0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r2, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) close(r1) 13:37:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='quota_quantum=0']) 13:37:38 executing program 0: r0 = getpgid(0x0) setpriority(0x1, r0, 0x7f) 13:37:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f00000015c0)={[{@session={'session', 0x3d, 0x8cffffff}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 644.352229][T20172] gfs2: quota_quantum mount option requires a positive numeric argument 13:37:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280), 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 644.405377][T20173] hfsplus: session requires an argument [ 644.411067][T20173] hfsplus: unable to parse mount options 13:37:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001fc0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001fc0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r2, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) close(r1) [ 644.522088][T20185] hfsplus: session requires an argument [ 644.534671][T20185] hfsplus: unable to parse mount options 13:37:38 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup3(r2, r1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000580)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}, &(0x7f0000000080)=0xb0) 13:37:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f00000015c0)={[{@session={'session', 0x3d, 0x8cffffff}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 644.845633][T20196] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001fc0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001fc0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r2, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) close(r1) 13:37:39 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000000c0)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "352367ef"}, 0x0, 0x0, @fd}) [ 645.010768][T20199] hfsplus: session requires an argument [ 645.034134][T20199] hfsplus: unable to parse mount options 13:37:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc487", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:37:39 executing program 3: setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000340)) 13:37:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f00000015c0)={[{@session={'session', 0x3d, 0x8cffffff}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:37:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6}, 0x40) 13:37:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00'}) 13:37:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:39 executing program 0: socket$unix(0x1, 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001300)='ns/pid_for_children\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) shutdown(r2, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 645.612746][T20218] hfsplus: session requires an argument [ 645.675595][T20218] hfsplus: unable to parse mount options 13:37:40 executing program 0: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000040)=0xfff, 0x8, 0x0) 13:37:40 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f00000015c0)={[{@session={'session', 0x3d, 0x8cffffff}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:37:40 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 645.860871][T20236] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:40 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x0, 0x0, 0x7fffffff}]}) [ 646.367280][T20242] hfsplus: session requires an argument [ 646.378699][T20242] hfsplus: unable to parse mount options 13:37:40 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x4) 13:37:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc487", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:37:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f00000015c0)={[{@session={'session'}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:37:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x27, 0x0, 0xc, 0xc, 0x3, [@ptr]}, {0x0, [0x0]}}, &(0x7f0000000340)=""/210, 0x27, 0xd2, 0x1}, 0x20) 13:37:42 executing program 3: mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000480)=0x7ff, 0x7, 0x1) 13:37:42 executing program 5: shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x6000) 13:37:42 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0x10) 13:37:42 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000080)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 648.538364][T20265] hfsplus: unable to find HFS+ superblock [ 648.547956][T20271] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)={[{@mtpt='mtpt'}]}) [ 648.623195][T20273] hfsplus: unable to find HFS+ superblock 13:37:43 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 13:37:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8, 0x2}]}}}]}, 0x3c}}, 0x0) 13:37:43 executing program 5: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x408441, 0x0) [ 648.830451][T20285] xfs: Unknown parameter 'mtpt' [ 649.001121][T20297] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 649.032561][T20298] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops 13:37:45 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0) mmap$snddsp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) 13:37:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc487", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:37:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80200, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:37:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:45 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)) 13:37:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8, 0x2}]}}}]}, 0x3c}}, 0x0) 13:37:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 651.638013][T20317] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 651.678104][T20320] loop5: detected capacity change from 512 to 0 [ 651.683306][T20324] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80200, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:37:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8, 0x2}]}}}]}, 0x3c}}, 0x0) [ 651.792934][T20320] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 13:37:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/210, 0x1a, 0xd2, 0x1}, 0x20) 13:37:46 executing program 5: socketpair(0x21, 0x0, 0x0, &(0x7f0000000040)) 13:37:46 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x40049409, &(0x7f0000000080)={0x0, @sco={0x1f, @none}, @generic={0x0, "999c615dc982b36e4639b9ffb6a8"}, @hci}) 13:37:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 652.081310][T20340] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 652.362261][T20351] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc487", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:37:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8, 0x2}]}}}]}, 0x3c}}, 0x0) 13:37:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000080)={[{@barrier='barrier'}, {@errors_withdraw='errors=withdraw'}]}) 13:37:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002a00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000005c0)={0x50, r1, 0x221, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x50}}, 0x0) 13:37:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc48739", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 654.758055][T20367] IPVS: Error joining to the multicast group [ 654.775127][T20364] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 654.812147][T20366] gfs2: not a GFS2 filesystem [ 654.823378][T20374] IPVS: Error joining to the multicast group [ 654.848993][T20377] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:49 executing program 0: socket$inet(0x2, 0x2, 0x73) 13:37:49 executing program 4: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') socketpair(0x26, 0x0, 0x0, &(0x7f00000017c0)) 13:37:49 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x2, @win={{}, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0}}) 13:37:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000080)={[{@barrier='barrier'}, {@errors_withdraw='errors=withdraw'}]}) 13:37:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 13:37:49 executing program 1: bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000002540)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0) 13:37:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={&(0x7f0000000880)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0xf5, 0x4, "0a438b3645475bde98e8bc83c2a1eda28606e9e26ccd90562339ae3f9e82915e7ce4fa687a493b1b555218112dc1742179edef05d2ba0ff150e06a81830fc00fcc0675b04491bd1560763adb68855cb3f4e230fb2643a7d892ec38688935e26b3d0de5494ae29522fcca551946c035cd6eed1ed60260c40d882ed312d2761c0452dd1016f257963e3b42818abf7094457de111732ed34ed10b51f82294fedd69dd2188f0b88e119db4671f55b8eedafdefad486d1c6a494e2f6b0f977cf72a8fb679e79ef4a9b4488f83eccb4915895a2b030de1b08f2a9c0fe832d092dbae2797e3fed132d408e4e307fe72f0a50b3903"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x174, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x24, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\xcd^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x15, 0x4, "b1e6d41b8e17df5c14e7faeb09ab051f25"}, @ETHTOOL_A_BITSET_VALUE={0x6d, 0x4, "50364ecccb8791eac81190ba61790af355b9efa8eeedd6b93a039f267ec1a23c7456254636df06b0a3c2bf328cfb938ee8dc735f2b3e08172c994d259efec91ea8a64057a42dc20e45dba4fd74d194f484002fd493540df6eb9d7200bb1304c6a988be4da7d22a0e52"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x35, 0x4, "bcf4c8ffe71db74156f60e1732894e1b2de260a1ae2a827e90cdf226a9099ef7c6ed15950cab092e6db5a73dd667d1d68a"}, @ETHTOOL_A_BITSET_VALUE={0x81, 0x4, "b7978ee4d7686073c3acf98c98d61a86c52505f7b522453ff829f49c033ab81dc71cf898c2b18ee0c0a9d444260c4466c786f6bae6d695b38496ad1ffc206de0d15de22cf93e999196e13d96d853fab167000c19ca202798137aed108dd1e8f2e4d5d2ba5d8ddb5498607856217777d9812d30227504a2e1b8e93529e2"}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0x380, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xf8, 0x3, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '^^^/%!,/\xf1\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'syz1\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\xb6&]{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'syz1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'ib\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\x82.)\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'ib\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x55, 0x4, "9c30c1540f5575d41588807b9cae8d308d1cec43ccc74faf311254f5c99145173304cf85a4a7c94adbe9eb3f079b30aa5cbefa203e77a859b8c46f657a1f8aee56150c5145613e42746ed538d1164356b1"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*)]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'ib\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '}{]&}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'syz1\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-(\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\xdd\'-!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '#}/--$(-\xd8/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'ib\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'syz1\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '+@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_BITS={0x4c, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'ib\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'eth\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'syz1\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x9, 0x5, "f273180b68"}, @ETHTOOL_A_BITSET_BITS={0x6c, 0x3, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'syz1\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x810, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x48, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'eth\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'syz1\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'eth\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',+:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'ib\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x69, 0x4, "efdd54547ddf3428199c8df046e79ea018008aa1152e2b863b52d18cd24ebe1a7ccb159d8e7a0dc85e0ba9fadd964f556840ad66912caa5bcc0211df8718729389f65f455c61a12cbfbbc5da983693256fc014910676b139314c8cb838dbdb8e5ee96e02de"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xf5, 0x5, "b7401395487f740da626d8601f6f683dd2a052f267e1026143b0b5d60744cee66857cb3e1e2571084c6a45d1a8dd6c0d8ef3915235d85dad8c4c297fc5c8ef7a07947748d9bd45e5530f37e139045c6f64dc5f410fcccdbf2b7f8010f3eb094e5c332e448c2528524fe1ceaff7a3b298ee396014190db802360f47d794a4855df76ac39c947ea7212d6a3304b4be89cd21016556342885175c139d750419d7fa03925be09b95e497e660019ed06a2a73d7f3dafacd685fcd54fac04f5303039d234ece091efb034c13da3a99a7304722306a43e5fa750765a56fc8de5b9d394ac04122fc9db7c4286b53ea17f02eb31a83"}, @ETHTOOL_A_BITSET_MASK={0x639, 0x5, "10f761b3bd285c01f55a1d18c25ffc46b8a45c9cf3a06f650c969c680fa6a71e809d278817c9d89cbd7a29c64705ed3a0f101533f318d0063ace87025f6cbfd104a09c859c5299e3061ecb40e0f3ad23315c799b905f2ad4330fe406b1815d66e689d73221edea654619825987f352956f58eba21e5236820ecf65b6d36bdd86ccca13dda53d863ee38600c0da4164a21587238c071e7bde5380e6a519c8e5436ce4e3805d243ff548e9ce24d374210605a9a2ea299b54b31741bad20f85888ebfb29d637423adfaa0844a592c034560f61f8c742950463cad18c67c6988977bf6b277acd309e96a3bd662b5a8615bc8d7b7bbaff1b729f46a3c982ba70b1009f302177acfc949af01ca1072d3b7cc7b648cc277504ca369ca5465c612a0f54b9b21e5090284cc1ac0d999ae4796be19b1099386ce732b7ac97d35eea1df3c81607fd129c5fa8e813f6b1b13ba97489a60628a0b887ad8c9cac96191d792a55f99a457728f47a03e697b8f591357a835c706f93f70f38d3d57aefa85bbcba4076c779cb98886a902c12df4d7bf1fd5225875a780eb34311891195f5d6e668d8e22db5013060fb2f2262d3d2c8a6dd81d24a6e840efc2019f3657b69be4fef3a116f894ab3885cf82f7a366e3245f66563db6554ffc625c0e0fba91035b62128c378bc412d121ba09d842966d9d96f3cb80ab700079f50b4fc170ffe8cd0474f93edbd193aaf54985d405d17cc38e6c12a8c36c42eea7bd24a9cf326f4028b28dcbb790c615739b7272e94f6912267a30e542512c2c33ef0fffba4ea014ed0687f80da7cdd18eb54e766734fa170c32269950ad844449751d3fe1b2009278e15991c1154733e47cce23e7e224f1d3d85e03f6414b12feacacd405e49e00bb7628d2ee8e100848904bb78175428aa906b31881aa90d2598de3d1483053437ef0d9c3f4fa44d2841738365c5a40511b89bfea9c76e07330e3e5020b33eeaee8d4bfa7fbd8092dda2747b8b9b13d8e369363fa019ab2fe6e08de515d5a3a4e02e532215194fb8d82a140950f7a6b45c00528145b17cc304cff0e8abfe8b03683d95faf632bce25b9ea54388f94d25cee0a7aa3e1c6fb2effa860c68fd8e1024b1c2bc44526e1669ba25da8f4285e728588a9ad572bb9175baf498a3865b8f1aaa171e25def2436159d2ae66270f70170b5dd3fb4bc9984fa821f8a0f93dc0627162628b0ca7c4d8df976e84f5486b85ff345e654386594d74d462289aef5c4e71f747fe8ff43cfdf186d866eb42b35bed4283266755d8433c359c8ed6f1622c72b6633e9ab708a61dacd4eec5ceaeb8c19503c4dff83beab4de20198ed31d3f67a2364420e0528136f4c6191644746561d9bc5a03a48fcba187ff6b33f6c09333e00da97bb2339a771c90b46341a5924243da8c8d17f2fbe9b3259f46de9d1d34e2703646e1ddbe23e253bc8eb731d0fa1fd0598a31b90265821acee2a78d14f902173378dfe80fe819f032d72fd4068a25ae21a942244c3aab11839f884c18511c034726afcdad265888b20a6034fe475221c535d681a41655f9ae64a3dfc7669f4b91047678ece7f56255c8c566b7239beea95f3b8240ab1a2461bbf94ae6aecbefd761b4ed92f49bf3071f2c01b3f1705b7d0142c76beee1827d40ec8193b46cd35d93446eb39823ac1fde7872355edc4b6e06eefb9007f1aae01edef63cce5ab12519533673b7971cae3bcdf05ac547e19a58d2004d5c0445245306402bd7eef8a54b143918c06cf006cf5c9160fe7568185288e7cc68b42123b9978994afee832a20da40447f6d28eb435bf045a9238c37a45e14ebec841306fb7995bf2ce48f8dea2d0f6b86e11db5d2cb9af65b28b230ee98b6d89dcd3fd5e67c1ff269bc3ab771621a5e5033fc193a53d44c6ad251b4c3e9b48dae0f04873d1dc87284425854721822204969dee2eb8a62c06f10cd57f0b7666372e46e6fd3d8ea2889efe0311775a54c6685a976f7a321937149a16293032a98978d3f7952ae46bbdb0fa62a6f54b4214e9d57b98cc1038cf188581f273b8416e580c4954d9eeaf397b1675815dbc7db37667690287a54e5612cb004bb72a0ab4829bfb78d881c62420d36619e95dff1d4246b206716523d7e5b15600b1357754e6cebc7082189141761a3f2cf5b3ef5793d92e6f268404b29b3a363226cc4f512af76a7ce508b57f7ef67bd1806ef5bd0b2ad395b6fdf0788e94e933269f8b"}]}]}, 0xec4}}, 0x0) [ 655.238885][T20393] gfs2: not a GFS2 filesystem [ 655.247176][T20396] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000080)={[{@barrier='barrier'}, {@errors_withdraw='errors=withdraw'}]}) 13:37:49 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000002400)={0x0, 0x0, 0x0}, 0x0) 13:37:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x333, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 655.631753][T20408] gfs2: not a GFS2 filesystem 13:37:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc48739", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:37:51 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f0000006240)='/dev/cuse\x00', 0x2, 0x0) 13:37:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000080)={[{@barrier='barrier'}, {@errors_withdraw='errors=withdraw'}]}) 13:37:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) accept(r2, 0x0, 0x0) 13:37:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x3, 0x4, 0x8001, 0x0, 0x1}, 0x22) 13:37:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) accept(r2, 0x0, 0x0) [ 657.828964][T20436] gfs2: not a GFS2 filesystem [ 657.848669][T20445] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:52 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00'}) 13:37:52 executing program 5: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 13:37:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) accept(r2, 0x0, 0x0) 13:37:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) 13:37:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 658.710747][T20468] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc48739", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:37:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) accept(r2, 0x0, 0x0) 13:37:55 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000140)={&(0x7f0000000040)=""/247, 0x0, 0x1000}, 0x20) 13:37:55 executing program 4: rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='./file1\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400019, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pselect6(0x40, &(0x7f0000000340)={0x6, 0x0, 0x5469, 0x1ff, 0x5, 0x6f, 0x6, 0x4}, &(0x7f0000000380)={0x101, 0x4, 0x2, 0x5, 0x20, 0x0, 0x7, 0x9}, &(0x7f0000000880)={0x1, 0x4, 0x5, 0x5, 0xcd1a, 0x5, 0x2}, &(0x7f00000008c0), &(0x7f0000000980)={&(0x7f0000000940)={[0x3]}, 0x8}) r3 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x200000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013a00)="02", 0x1, 0x30400}, {&(0x7f0000013b00)="03", 0x1, 0x30800}, {&(0x7f0000013c00)="04", 0x1, 0x30c00}, {&(0x7f0000013d00)="05", 0x1, 0x31000}, {&(0x7f0000013e00)="00000000000000000100000000000000000000000000000008", 0x19, 0x31400}], 0x0, &(0x7f0000001700)=ANY=[]) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000840)={0x3c, 0x4, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x180000}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x200}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}]}, 0x3c}}, 0xc812) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="41000000010000008601000069c05883"]) socket$inet6(0xa, 0x5, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000400)={0x0, 0xfffffff9}, &(0x7f0000000900)=0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000440)={"cae48410fbaddf61fba6778f7f76179985353adeaabe42de583f4e7937b1acfed25a86fa2ac92a25bbc3badd2e055558432d707cfa70042fcd0f594ce8e2d5cf821e99d6c4ec2b8a0efb024438827295fc8a9a9150201591c4ae3dd0d37b4eeca043aade23d0eabc9a9553e45dcfa98e64c97b5d223949f9051531bcef2e375650aac0ef526621b21808d5cfc402f329751e34794c46e471bd59407c556c12d5f0753e742e9c78199f416cd94c9e468f1bf0f53d7a0e89b0cb0dca75e827ef8af244d083a3c53c96cae1fd8cdbb0ee59ad07ff9847abd8c2c51966306c5dddac4b5366eea03974987ae13b4dcf2a3c1f99b1d5f5a0df1509dc40b223d04b077853dd7b3267b01427943c1568d165006f550a44db4a9259f93111653be526f3869ff3696d2faaf3db9caa6ac64870faec2a9d0ff08e3c1c643063eabe3f92b12dc97383bfddde876e2cb2fd0b7764d2d8a140ffce863bafb2b49542ab4074debb9b6c7549c4c7385768c686eba34ec1c893b78702f8aebc83b36cbabebfd27f5cfff1cba8913802b1e4d24bb2402c36e06da4abbd04c159450091bcd8fe34d491fa6442d0e26bcf838b43ec201c175dc15565a000232df2cb39cd44f3dc969377a992382e66adca64fe15918c2f1dae7850695a6117974f91cc03af5aa68f8614e2888d63cee37e59cff7ccf6b4f59a0dd619c1f9d6d4f26f50a4137d702936d1ea0e5de208cdf9b745985cb48df3250558ecc5b0b50ef418de6c7a75b9cb82f682a62f1ab3e5dde93229d9a2ba010a270e4eb70b95554d22e09fd62bd6925dc160dd83d07691c94be371637b523ac9b66946795c522c078a8aabfe6ccb554d9cbd2651fa7b669caa592c25c121570e64f0d54b1f0706a59097b73fbd9c504d942219b2b1cb23d477476e49e9c3152bc28a6f6ec6199567cfc13d1e349416fbb8ff077a6fa92f4c684003d6f45b70cad11b94f693f1f7fc9431c913bf9c6a04fd05ff43c3d10ee98c618cb1a1c38524f84125f05a68afa6d07a2fd280bb6674fe231059adc83949689aa1d3735d9ab8fc331601daa9b2553cb20f732162c7ca8a82148df0954fee91b0bc7d601bb6b951c2df4bd8f1927ec4c40f0d45db7c7e1849296f6876f1a5befadcf95525a7242ffe823f77c68ca7a303985945ff98ae567b743d58440aeec7031beca65613b1f67236d223af8c9aa68b959434c65ab31c93e579e10c66539cc79f13d0d1ccc4a2a601029c8dd45fcebcbe670ae714dead585a437acafae2423b017d882e973d7831310a40ede88704db312c897b7442f5350d2e4ca4a0049382be48969966ee9df9ffd500ab58e201fd83ae16693a2b653d90ddba5a2a4f645ab7b4b70e5d3297b48c023b728d919df81b4b707442e223e90cce81926a618aa2c6e113adf147e1a2cecd5d6f227e49f9567ad1a7312bb3"}) 13:37:55 executing program 5: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 13:37:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:55 executing program 1: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0xfffffffffffffffa}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x8001]}, 0x8}) 13:37:55 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x42, 0x0) [ 660.996447][T20490] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 661.061666][T20486] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 661.123700][T20493] loop4: detected capacity change from 4096 to 0 [ 661.172220][T20486] overlayfs: option "index=on" is useless in a non-upper mount, ignore [ 661.284484][T20486] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 661.297431][T20493] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 661.425587][T20493] EXT4-fs warning (device loop4): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 13:37:55 executing program 1: socket(0x22, 0x0, 0x1) [ 661.514156][T20493] EXT4-fs (loop4): mount failed 13:37:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:55 executing program 0: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000000)) 13:37:55 executing program 5: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) [ 661.707955][T20486] loop4: detected capacity change from 4096 to 0 [ 661.731696][T20493] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 661.793024][T20493] overlayfs: option "index=on" is useless in a non-upper mount, ignore [ 661.801432][T20493] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 661.947290][T20530] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:37:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="c32429381f8db5d3a0fbe448c8a91dea5be7fefea5f2e00abb59e4c924fd08e942c571bcb243523015e3350b1c6e68a26447d42f14cfd7394d8d6a68d76ffff2cb4fbc183a0200e4be9b9fc7bae54199dd00d70aed59af0605000000136ca34815a286a717d88605d5a9710a2fac78dbf2bd1cf88975dd269c518cc58a1b9a1ff998875977d2f315481ea9791bdb3eff2db6c0ca528150c0b12dd92e75a77c73aa64295ebf00ef948817db51bfa327ec8ed5b7df08c4cfb61c57666aa153c81080670cec57348b3e1435a25ae0d4c1a40dd5db837855c6c03c6201c2cb6eb63a5a906fbc553a358e38ec07de041bc48739", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:37:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) 13:37:58 executing program 0: syz_usb_connect(0x0, 0x24, &(0x7f0000000b40)=ANY=[@ANYBLOB="1201f4001e611e20402000d3d7de000000010902000001"], 0x0) 13:37:58 executing program 4: rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='./file1\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400019, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pselect6(0x40, &(0x7f0000000340)={0x6, 0x0, 0x5469, 0x1ff, 0x5, 0x6f, 0x6, 0x4}, &(0x7f0000000380)={0x101, 0x4, 0x2, 0x5, 0x20, 0x0, 0x7, 0x9}, &(0x7f0000000880)={0x1, 0x4, 0x5, 0x5, 0xcd1a, 0x5, 0x2}, &(0x7f00000008c0), &(0x7f0000000980)={&(0x7f0000000940)={[0x3]}, 0x8}) r3 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x200000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013a00)="02", 0x1, 0x30400}, {&(0x7f0000013b00)="03", 0x1, 0x30800}, {&(0x7f0000013c00)="04", 0x1, 0x30c00}, {&(0x7f0000013d00)="05", 0x1, 0x31000}, {&(0x7f0000013e00)="00000000000000000100000000000000000000000000000008", 0x19, 0x31400}], 0x0, &(0x7f0000001700)=ANY=[]) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000840)={0x3c, 0x4, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x180000}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x200}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}]}, 0x3c}}, 0xc812) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="41000000010000008601000069c05883"]) socket$inet6(0xa, 0x5, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000400)={0x0, 0xfffffff9}, &(0x7f0000000900)=0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000440)={"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"}) 13:37:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:37:58 executing program 5: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x309, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xfffc}], 0x1, 0x0, 0x1f4}}], 0xffffff1f, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 13:37:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) [ 664.094662][T20560] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 664.169765][T20557] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 664.249392][T20557] overlayfs: option "index=on" is useless in a non-upper mount, ignore [ 664.276820][T20563] loop4: detected capacity change from 4096 to 0 [ 664.298047][ T9730] usb 1-1: new high-speed USB device number 6 using dummy_hcd 13:37:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 664.438404][T20563] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 664.460010][T20557] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 13:37:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) [ 664.481918][T20563] EXT4-fs warning (device loop4): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 664.499048][T20563] EXT4-fs (loop4): mount failed [ 664.592540][ T9730] usb 1-1: Using ep0 maxpacket: 32 [ 664.732695][ T9730] usb 1-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 664.767205][T20583] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 664.776333][ T9730] usb 1-1: New USB device found, idVendor=2040, idProduct=d300, bcdDevice=de.d7 13:37:59 executing program 4: rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='./file1\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400019, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pselect6(0x40, &(0x7f0000000340)={0x6, 0x0, 0x5469, 0x1ff, 0x5, 0x6f, 0x6, 0x4}, &(0x7f0000000380)={0x101, 0x4, 0x2, 0x5, 0x20, 0x0, 0x7, 0x9}, &(0x7f0000000880)={0x1, 0x4, 0x5, 0x5, 0xcd1a, 0x5, 0x2}, &(0x7f00000008c0), &(0x7f0000000980)={&(0x7f0000000940)={[0x3]}, 0x8}) r3 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x200000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013a00)="02", 0x1, 0x30400}, {&(0x7f0000013b00)="03", 0x1, 0x30800}, {&(0x7f0000013c00)="04", 0x1, 0x30c00}, {&(0x7f0000013d00)="05", 0x1, 0x31000}, {&(0x7f0000013e00)="00000000000000000100000000000000000000000000000008", 0x19, 0x31400}], 0x0, &(0x7f0000001700)=ANY=[]) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000840)={0x3c, 0x4, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x180000}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x200}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}]}, 0x3c}}, 0xc812) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="41000000010000008601000069c05883"]) socket$inet6(0xa, 0x5, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000400)={0x0, 0xfffffff9}, &(0x7f0000000900)=0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000440)={"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"}) [ 664.888254][ T9730] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 13:37:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) [ 664.967346][ T9730] usb 1-1: config 0 descriptor?? 13:37:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000540)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="d0000000000000002900000002000000d4087d48eda49ade72d10bd94eb356463668101505fc164f8dc621a8e5dc484eb3ba938f2d01e693488b3932a0ef704931f5880a038a39d097e974888c7cca675069e0c5cb17010fd097e29765892c405349c7d7633d46456e4775245241394f01df2e0a62242626735794c3face873acedaddca6c8b28fb30e4107f4cee60c19b9981128bdad92ba3eb6448ed667e07c206ba27502d6e76fafffe534d664d03e75a1f14ce002347643c652206a086db61b39f91065fac9f6e4c6500000000001001"], 0x1e0}, 0x0) [ 665.120581][T20588] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 665.164805][T20588] overlayfs: option "index=on" is useless in a non-upper mount, ignore [ 665.180974][T20591] loop4: detected capacity change from 4096 to 0 [ 665.199801][T20588] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 665.236777][ T9730] usb 1-1: USB disconnect, device number 6 [ 665.249510][T20591] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 665.260042][T20591] EXT4-fs warning (device loop4): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 665.277924][T20591] EXT4-fs (loop4): mount failed [ 666.032406][ T7] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 666.302432][ T7] usb 1-1: Using ep0 maxpacket: 32 [ 666.432386][ T7] usb 1-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 666.441669][ T7] usb 1-1: New USB device found, idVendor=2040, idProduct=d300, bcdDevice=de.d7 [ 666.452842][ T7] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 666.463137][ T7] usb 1-1: config 0 descriptor?? [ 666.732649][ T7] usb 1-1: USB disconnect, device number 7 13:38:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') 13:38:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000"], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:01 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) 13:38:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000018c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000019c0)={&(0x7f0000001880), 0xc, &(0x7f0000001980)={&(0x7f0000001900)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:38:01 executing program 4: rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='./file1\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400019, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pselect6(0x40, &(0x7f0000000340)={0x6, 0x0, 0x5469, 0x1ff, 0x5, 0x6f, 0x6, 0x4}, &(0x7f0000000380)={0x101, 0x4, 0x2, 0x5, 0x20, 0x0, 0x7, 0x9}, &(0x7f0000000880)={0x1, 0x4, 0x5, 0x5, 0xcd1a, 0x5, 0x2}, &(0x7f00000008c0), &(0x7f0000000980)={&(0x7f0000000940)={[0x3]}, 0x8}) r3 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x40, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x200000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013a00)="02", 0x1, 0x30400}, {&(0x7f0000013b00)="03", 0x1, 0x30800}, {&(0x7f0000013c00)="04", 0x1, 0x30c00}, {&(0x7f0000013d00)="05", 0x1, 0x31000}, {&(0x7f0000013e00)="00000000000000000100000000000000000000000000000008", 0x19, 0x31400}], 0x0, &(0x7f0000001700)=ANY=[]) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000840)={0x3c, 0x4, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x180000}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x200}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}]}, 0x3c}}, 0xc812) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="41000000010000008601000069c05883"]) socket$inet6(0xa, 0x5, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000400)={0x0, 0xfffffff9}, &(0x7f0000000900)=0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000440)={"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"}) 13:38:01 executing program 3: syz_emit_ethernet(0x1016, &(0x7f0000002180)=ANY=[], 0x0) 13:38:01 executing program 0: syz_emit_ethernet(0x1016, 0x0, 0x0) 13:38:01 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) 13:38:01 executing program 5: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x408400, 0x0) [ 667.255375][T20646] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 667.282693][T20642] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore 13:38:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) [ 667.352674][T20648] loop4: detected capacity change from 4096 to 0 [ 667.366102][T20642] overlayfs: option "index=on" is useless in a non-upper mount, ignore [ 667.398430][T20648] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 667.420255][T20642] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 667.444315][T20648] EXT4-fs warning (device loop4): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 667.470549][T20648] EXT4-fs (loop4): mount failed 13:38:01 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') io_setup(0x9f57, &(0x7f0000000000)=0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f00000000c0)={{}, 0x20}) socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x0, 0x0) 13:38:01 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) 13:38:01 executing program 5: bind$phonet(0xffffffffffffffff, 0x0, 0x0) 13:38:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000"], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:02 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) 13:38:02 executing program 4: socketpair(0x2, 0xa, 0xfffffff7, &(0x7f0000000440)) 13:38:02 executing program 5: keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080), &(0x7f00000000c0)=ANY=[], 0x0, 0x0) 13:38:02 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) 13:38:02 executing program 0: socketpair(0x18, 0x0, 0xfffffffb, &(0x7f0000002500)) 13:38:02 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) 13:38:02 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, @name="2465cb1c6b3d8e75b7193836cecf50d3a46526518d9c234975cc1e6094741419"}) [ 668.099237][T20688] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:04 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) 13:38:04 executing program 4: syz_emit_ethernet(0x10, 0x0, 0x0) 13:38:04 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f00000005c0), 0x8) 13:38:04 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2c0dd08a65739f91}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 13:38:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000"], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:04 executing program 4: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000780)='/dev/nvme-fabrics\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 13:38:04 executing program 1: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) [ 670.607730][T20715] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:04 executing program 5: add_key$fscrypt_v1(&(0x7f0000003e00)='logon\x00', 0x0, &(0x7f0000003e80)={0x0, "7802f705b5f6a147dd1d2e3e7943036053c70d547b82a07f7546023d3253ddde8b0ae2ecc74a1a3ccb6d1e1a9421ade38524bd804bb4f12c5f884b2497e85ce2"}, 0x48, 0xfffffffffffffffc) 13:38:05 executing program 0: r0 = eventfd2(0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 13:38:05 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vhost-vsock\x00', 0x2, 0x0) 13:38:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f31000014000200677265300000"], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 671.107361][T20736] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:07 executing program 1: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) 13:38:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000192c0)=ANY=[@ANYBLOB="14000000100003210000000000000000"], 0x74}}, 0x0) socket$inet6(0xa, 0x0, 0x0) 13:38:07 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000000)={@multicast, @local, @val={@void}, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, @multicast1, @private}}}}}}, 0x0) 13:38:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) 13:38:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f31000014000200677265300000"], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:08 executing program 5: io_getevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)) [ 673.768624][T20760] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:08 executing program 4: add_key$keyring(&(0x7f0000001880)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 13:38:08 executing program 1: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) 13:38:08 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @multicast, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x4, 0x0, @multicast, "0f6ba81f", @multicast, "d107d5fa"}}}}, 0x0) 13:38:08 executing program 4: io_setup(0x0, &(0x7f0000000580)) 13:38:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 13:38:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:11 executing program 5: syz_emit_ethernet(0x20000290, &(0x7f0000000280)={@random="30cd6f2cbbe0", @broadcast, @void, {@generic={0x0, 'RJ'}}}, 0x0) 13:38:11 executing program 0: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) io_setup(0x6, &(0x7f0000000580)) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snd/timer\x00', 0xb0080) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/urandom\x00', 0xc0200, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001d00)='/proc/self/net/pfkey\x00', 0x10340, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/video1\x00', 0x2, 0x0) 13:38:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 13:38:11 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000002580)={0x0, 0x0, 0x0}, 0x61) 13:38:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f31000014000200677265300000"], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:11 executing program 4: inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) r0 = getpid() r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000a40)=ANY=[@ANYBLOB="52019b1be2020a51a113b0f98c7b16c751b3b4a431e452cc3cde8712cd1f37bd51700100831c9d3eef735adfd1e93882f6080577bda97f9732436b13f21c5589685f3397da381dda91888c893ac4e355e17272aaa31aa93a5119b73bb7282485069c025634b6252a7c344c82b697bb81a1134cf329bf2047440a0d6a5cac056682c795011e000000000000446b9f9bf2e319402d553a4068a211fe51be9f9086ef119e1cf7a14f88665f036317c3d5668e81cb7772a4e3567094ce292cc6c07b96f47ba84a77226bb8c5629c1e22f707335bd16635437b65eb9dc89104e3361781505da1325d8c6425d565760ea0f908e819f68bb6eb1acc0f0fb5f1587e143d5b2af0731a3b3a7495278aed7a2406de4e07b44bac013b1b2628c6d716164d39cb2c24fb5d98c285b4e503e3ce71564505f8acb8fa967887e413ec0fb424fed3ebfca40884ffa74364a19ac84841bb78dca761f8cd9a556d111a15f6d0e0180f072300000000f538d422d7d0ebb231c3dadacba459ddedf633df95da2d8c79411bf5b3c721bbdb639404023d829700000000000000000000563c7e25e52b997a6060f4f53a1e99e994c763c8d612279f5706f236f55042ad80e4a1017d97444ce921ef164ff34d6756cdf60752be1a33d315ff6218e422d962e5b7db3de8c6e71724d888fa547f8c6a5759822412b525fb668afef6eccbb63225ba5d7287f17062e94a609bb13134090463b1086ef50b3587cab7c36b35d861b56f02686105b8c89080e7360a0e455ec5d421c6d9c954e068d4e75dfa63b983f7e84a94ab7c2a35e89260621f7083e02fe060b0e1c32f25c6aa7d9752d88aea9b27608523037d010a7a6bf31b318e2a42c1136bca3fbd8cb11de93f03654a7a7aded72092f0725e71667da0792d9e8f404b61ed1ac05a33e5da731b9eef3c88a3bd73446ce4ce894512df0e9f7ecbbc0b9fc266ef16a8b905b939ebb23852808874915d5ed7bc406443a15e375eb70aaa04", @ANYRES16], 0x1a0) readlinkat(r1, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=""/3, 0x3) sched_setscheduler(0x0, 0x0, &(0x7f00000002c0)) timer_create(0x0, 0x0, 0x0) epoll_create1(0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) creat(&(0x7f0000000300)='./bus\x00', 0x0) [ 676.867456][ T34] audit: type=1400 audit(1608903491.111:220): avc: denied { write } for pid=20794 comm="syz-executor.0" name="net" dev="proc" ino=60191 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 13:38:11 executing program 5: add_key$fscrypt_v1(&(0x7f0000003e00)='logon\x00', 0x0, &(0x7f0000003e80)={0x0, "7802f705b5f6a147dd1d2e3e7943036053c70d547b82a07f7546023d3253ddde8b0ae2ecc74a1a3ccb6d1e1a9421ade38524bd804bb4f12c5f884b2497e85ce2", 0x23}, 0x48, 0xfffffffffffffffc) 13:38:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) [ 676.910036][T20802] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 676.980198][ T34] audit: type=1400 audit(1608903491.141:221): avc: denied { add_name } for pid=20794 comm="syz-executor.0" name="pfkey" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 13:38:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) [ 677.120389][ T34] audit: type=1400 audit(1608903491.151:222): avc: denied { create } for pid=20794 comm="syz-executor.0" name="pfkey" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:kernel_t:s0 tclass=file permissive=1 13:38:11 executing program 5: io_setup(0x9f57, &(0x7f0000000000)) 13:38:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:38:14 executing program 0: getitimer(0x0, &(0x7f00000004c0)) 13:38:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:14 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/adsp1\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) 13:38:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:38:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000001f80)={0x10, 0x2}, 0x10) listen(r0, 0xe1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000040)={0x0, 0x2, 0x1, [0x1]}, 0xa) 13:38:14 executing program 5: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x1410c0) 13:38:14 executing program 0: r0 = gettid() waitid(0x1, r0, 0x0, 0x2, 0x0) [ 679.988690][T20844] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:38:14 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x82382fe9368327e0) 13:38:14 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001900)='/dev/vcsu\x00', 0x0, 0x0) sendmsg$SMC_PNETID_GET(r0, 0x0, 0x0) 13:38:14 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) write$tun(r0, 0x0, 0x0) 13:38:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 13:38:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:17 executing program 4: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@private2}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000140)={[0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc5b]}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f00000000c0)=0x6b) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_POLL(r4, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0xffffffff}}, 0x18) 13:38:17 executing program 5: syz_emit_ethernet(0x10, &(0x7f0000000280)={@random="30cd6f2cbbe0", @broadcast, @void, {@generic={0x0, 'RJ'}}}, 0x0) 13:38:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x9}}, 0x20) 13:38:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 13:38:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 683.109530][T20883] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x9}}, 0x20) 13:38:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 13:38:17 executing program 5: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000200)) 13:38:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbba505000000000000", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000300)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 13:38:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 683.595396][T20906] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 13:38:20 executing program 5: socket$inet(0x2, 0x6, 0x0) 13:38:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:20 executing program 4: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x3c18f939621f337d, 0xffffffffffffffff, 0x0) 13:38:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000540)={@empty}, &(0x7f0000000580)=0x20) 13:38:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/38], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 13:38:20 executing program 4: io_setup(0x1, &(0x7f0000000540)) io_setup(0x6, &(0x7f0000000580)) 13:38:20 executing program 0: socket$inet(0x2, 0xa, 0x2) 13:38:20 executing program 5: getitimer(0x9ed1bc81d0e05f50, 0x0) [ 686.245887][T20933] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)}], 0x1}, 0x0) 13:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, 0x0) 13:38:20 executing program 0: io_setup(0x3c9f, &(0x7f00000009c0)) 13:38:20 executing program 4: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) [ 686.990986][ T7] usb 5-1: new high-speed USB device number 5 using dummy_hcd [ 687.601131][ T7] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 687.610620][ T7] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 687.622732][ T7] usb 5-1: Product: syz [ 687.626945][ T7] usb 5-1: Manufacturer: syz [ 687.634243][ T7] usb 5-1: SerialNumber: syz [ 687.692228][ T7] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 688.411218][ T7] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 688.823968][ T9797] usb 5-1: USB disconnect, device number 5 13:38:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/38], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)}], 0x1}, 0x0) 13:38:23 executing program 5: keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000004000), &(0x7f0000004040)={'enc=', 'pkcs1', ' hash=', {'sha256-arm64-neon\x00'}}, 0x0, 0x0) 13:38:23 executing program 0: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:38:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)}], 0x1}, 0x0) 13:38:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) [ 689.375725][T20986] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 689.441220][ T7] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 689.450657][ T7] ath9k_htc: Failed to initialize the device [ 689.478963][ T9797] usb 5-1: ath9k_htc: USB layer deinitialized 13:38:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36", 0x24}], 0x1}, 0x0) [ 689.580864][ T8464] usb 1-1: new high-speed USB device number 8 using dummy_hcd 13:38:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/38], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36", 0x24}], 0x1}, 0x0) 13:38:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36", 0x24}], 0x1}, 0x0) [ 689.830784][ T8464] usb 1-1: Using ep0 maxpacket: 8 [ 689.860973][ T9797] usb 5-1: new high-speed USB device number 6 using dummy_hcd [ 689.906919][T21012] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:24 executing program 4: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) [ 689.953224][ T8464] usb 1-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 689.973335][ T8464] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 690.028090][ T8464] usb 1-1: config 0 descriptor?? [ 690.082781][ T8464] cp210x 1-1:0.0: cp210x converter detected [ 690.300946][ T8464] cp210x 1-1:0.0: failed to get vendor val 0x370b size 1: -71 [ 690.308629][ T9797] usb 5-1: device not accepting address 6, error -71 [ 690.318254][ T8464] cp210x 1-1:0.0: querying part number failed [ 690.350240][ T8464] usb 1-1: cp210x converter now attached to ttyUSB0 [ 690.365669][ T8464] usb 1-1: USB disconnect, device number 8 [ 690.382553][ T8464] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 690.396039][ T8464] cp210x 1-1:0.0: device disconnected [ 690.687642][ T9797] usb 5-1: new high-speed USB device number 7 using dummy_hcd [ 691.060738][ T17] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 691.210891][ T9797] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 691.219975][ T9797] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 691.231947][ T9797] usb 5-1: Product: syz [ 691.236585][ T9797] usb 5-1: Manufacturer: syz [ 691.244561][ T9797] usb 5-1: SerialNumber: syz [ 691.301845][ T9797] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 691.310807][ T17] usb 1-1: Using ep0 maxpacket: 8 [ 691.430745][ T17] usb 1-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 691.440129][ T17] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 691.456520][ T17] usb 1-1: config 0 descriptor?? [ 691.502698][ T17] cp210x 1-1:0.0: cp210x converter detected [ 691.721017][ T17] cp210x 1-1:0.0: failed to get vendor val 0x370b size 1: -71 [ 691.731058][ T17] cp210x 1-1:0.0: querying part number failed [ 691.751999][ T17] usb 1-1: cp210x converter now attached to ttyUSB0 [ 691.784047][ T17] usb 1-1: USB disconnect, device number 9 [ 691.795138][ T17] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 691.806984][ T17] cp210x 1-1:0.0: device disconnected [ 691.900810][ T9797] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 13:38:26 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff0003", 0x36}], 0x1}, 0x0) 13:38:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/39], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:26 executing program 0: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 692.343855][ T9730] usb 5-1: USB disconnect, device number 7 13:38:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff0003", 0x36}], 0x1}, 0x0) 13:38:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) [ 692.521650][T21087] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff0003", 0x36}], 0x1}, 0x0) [ 692.720791][ T7] usb 1-1: new high-speed USB device number 10 using dummy_hcd 13:38:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d9000000000000", 0x3f}], 0x1}, 0x0) 13:38:27 executing program 4: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) 13:38:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/39], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d9000000000000", 0x3f}], 0x1}, 0x0) [ 692.960785][ T9797] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 692.960786][ T7] usb 1-1: Using ep0 maxpacket: 8 [ 692.990711][ T9797] ath9k_htc: Failed to initialize the device [ 693.015982][ T9730] usb 5-1: ath9k_htc: USB layer deinitialized [ 693.091013][ T7] usb 1-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 693.106050][ T7] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 13:38:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d9000000000000", 0x3f}], 0x1}, 0x0) [ 693.142350][T21116] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 693.156170][ T7] usb 1-1: config 0 descriptor?? [ 693.202312][ T7] cp210x 1-1:0.0: cp210x converter detected [ 693.430845][ T7] cp210x 1-1:0.0: failed to get vendor val 0x370b size 1: -71 [ 693.438399][ T7] cp210x 1-1:0.0: querying part number failed [ 693.460592][ T9730] usb 5-1: new high-speed USB device number 8 using dummy_hcd [ 693.486365][ T7] usb 1-1: cp210x converter now attached to ttyUSB0 [ 693.509382][ T7] usb 1-1: USB disconnect, device number 10 [ 693.527319][ T7] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 693.555815][ T7] cp210x 1-1:0.0: device disconnected [ 694.031081][ T9730] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 694.044700][ T9730] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 694.061597][ T9730] usb 5-1: Product: syz [ 694.066134][ T9730] usb 5-1: Manufacturer: syz [ 694.081852][ T9730] usb 5-1: SerialNumber: syz [ 694.150257][ T9730] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 694.830533][ T9730] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 695.274968][ T9797] usb 5-1: USB disconnect, device number 8 13:38:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310", 0x44}], 0x1}, 0x0) 13:38:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/39], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00'}) 13:38:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310", 0x44}], 0x1}, 0x0) [ 695.615467][T21157] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:29 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') clock_gettime(0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x60080108}, 0xc, &(0x7f0000000c40)={0x0}}, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/cachefiles\x00', 0x1, 0x0) 13:38:30 executing program 4: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) 13:38:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310", 0x44}], 0x1}, 0x0) 13:38:30 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vcsu\x00', 0x0, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:38:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 695.920519][ T9730] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 695.929862][ T9730] ath9k_htc: Failed to initialize the device [ 695.953435][ T9797] usb 5-1: ath9k_htc: USB layer deinitialized 13:38:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b", 0x46}], 0x1}, 0x0) [ 696.198199][T21186] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 696.380620][ T9797] usb 5-1: new high-speed USB device number 9 using dummy_hcd [ 696.910472][ T9797] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 696.919611][ T9797] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 696.935242][ T9797] usb 5-1: Product: syz [ 696.939510][ T9797] usb 5-1: Manufacturer: syz [ 696.946550][ T9797] usb 5-1: SerialNumber: syz [ 697.001581][ T9797] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 697.580425][ T9797] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 698.025916][ T9730] usb 5-1: USB disconnect, device number 9 13:38:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x88, 0x11, 0x0, 0x0) 13:38:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b", 0x46}], 0x1}, 0x0) 13:38:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:32 executing program 4: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) [ 698.640477][ T9797] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 698.647669][ T9797] ath9k_htc: Failed to initialize the device [ 698.676009][ T9730] usb 5-1: ath9k_htc: USB layer deinitialized 13:38:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:33 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b", 0x46}], 0x1}, 0x0) [ 698.734178][T21221] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c", 0x47}], 0x1}, 0x0) 13:38:33 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:33 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) [ 699.070317][ T9730] usb 5-1: new high-speed USB device number 10 using dummy_hcd 13:38:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c", 0x47}], 0x1}, 0x0) [ 699.630681][ T9730] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 699.639781][ T9730] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 699.659943][ T9730] usb 5-1: Product: syz [ 699.664646][ T9730] usb 5-1: Manufacturer: syz [ 699.669537][ T9730] usb 5-1: SerialNumber: syz [ 699.731201][ T9730] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 700.400540][ T9730] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 700.609932][ T3192] usb 5-1: USB disconnect, device number 10 [ 701.440387][ T9730] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 701.447412][ T9730] ath9k_htc: Failed to initialize the device [ 701.460420][ T3192] usb 5-1: ath9k_htc: USB layer deinitialized 13:38:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:35 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400202000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c", 0x47}], 0x1}, 0x0) 13:38:35 executing program 4: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) 13:38:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 13:38:36 executing program 0: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) [ 701.845106][T21279] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:36 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snd/timer\x00', 0xb0080) 13:38:36 executing program 0: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) [ 702.050035][T14600] usb 5-1: new high-speed USB device number 11 using dummy_hcd 13:38:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4e", 0xa3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:36 executing program 0: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) [ 702.570446][T14600] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 702.579614][T14600] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 702.591840][T14600] usb 5-1: Product: syz [ 702.596387][T14600] usb 5-1: Manufacturer: syz [ 702.610028][T14600] usb 5-1: SerialNumber: syz [ 702.662016][T14600] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 703.242314][T14600] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 703.471089][ T3192] usb 5-1: USB disconnect, device number 11 [ 704.320000][T14600] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 704.328192][T14600] ath9k_htc: Failed to initialize the device [ 704.343213][ T3192] usb 5-1: ath9k_htc: USB layer deinitialized 13:38:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:39 executing program 0: r0 = syz_open_dev$video(0x0, 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:39 executing program 4: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) 13:38:39 executing program 0: r0 = syz_open_dev$video(0x0, 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) [ 704.898428][T21329] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:39 executing program 0: r0 = syz_open_dev$video(0x0, 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 705.172998][ T3192] usb 5-1: new high-speed USB device number 12 using dummy_hcd 13:38:39 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:39 executing program 1: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0xfffffffffffffd60) [ 705.387020][T21350] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:39 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:39 executing program 1: io_setup(0x9, &(0x7f00000003c0)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) [ 705.759245][ T3192] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 705.772988][ T3192] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 705.829779][ T3192] usb 5-1: Product: syz [ 705.837532][ T3192] usb 5-1: Manufacturer: syz [ 705.849591][ T3192] usb 5-1: SerialNumber: syz [ 705.893911][ T3192] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 706.610023][ T3192] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 706.821154][T14600] usb 5-1: USB disconnect, device number 12 [ 707.679783][ T3192] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 707.686806][ T3192] ath9k_htc: Failed to initialize the device [ 707.697037][T14600] usb 5-1: ath9k_htc: USB layer deinitialized 13:38:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:42 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0xe5}}, 0xe8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) bind$netlink(r1, &(0x7f00000000c0), 0xc) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, 0x0, 0x0) 13:38:42 executing program 4: syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) [ 708.033922][T21387] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:42 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:42 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:38:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:42 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:42 executing program 1: r0 = getpid() perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x5}, r0, 0x9, 0xffffffffffffffff, 0x0) 13:38:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:42 executing program 4: syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) 13:38:42 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:42 executing program 1: socket$netlink(0x10, 0x3, 0x8) 13:38:42 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, 0x0) 13:38:43 executing program 1: select(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) [ 708.711295][T21424] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:45 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, 0x0) 13:38:45 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000740)={{0x77359400}}, 0x0) 13:38:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:45 executing program 4: syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) 13:38:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 711.438814][T21448] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:45 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 13:38:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:45 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, 0x0) 13:38:45 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x0, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:45 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 13:38:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:46 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x0, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) 13:38:46 executing program 4: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) 13:38:46 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x205, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x0, @raw_data="810b540d676909ff92583674cf4593ec225e101c5c19dd02f0124033cdea56eb6f4446d1315d2e8e5dd7dc5dfbec82d5ae4e5be5c4ffd379288339cc8cd238daf6e3643215e75151211e556a3301f41d80ee0a845af1bda30ae6529ad1c0badc399ed05b9177f55352c73140c3a81df28e11ced778a7f365c4945759e1dfee6fa0e424bd233c66d7d549d274a4f2c389b8a7083fc71e62f3486112d4e786865535447e30286024c2cbbaee3ef5453482879248a09ed7aa25dce275b83f5f1956a9dcb707e5f88fdf"}) [ 711.993209][T21469] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c2", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 712.231590][T21476] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:48 executing program 0: r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001780)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 13:38:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c2", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 714.492998][T21494] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:48 executing program 4: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) 13:38:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x7, 0xb5, &(0x7f0000000200)=""/181, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300), 0x10}, 0x78) 13:38:48 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x20400, 0x0) 13:38:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c2", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 714.795685][T21506] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:49 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000780)='hfsplus\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000ac0)=[{0x0, 0x0, 0xfffffffffffffff7}], 0x0, &(0x7f0000000b40)) 13:38:49 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 13:38:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5f", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:49 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 715.027513][T21514] loop0: detected capacity change from 16383 to 0 [ 715.037898][T21518] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 715.099851][T21514] hfsplus: unable to find HFS+ superblock [ 715.169821][T21514] loop0: detected capacity change from 16383 to 0 [ 715.202339][T21514] hfsplus: unable to find HFS+ superblock 13:38:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5f", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:51 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) r0 = socket$netlink(0x10, 0x3, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="1c00000007ffff0f008096dab1eb742686a8766a6e83a100e8e1bc6f53cc108972560000e49e9592e28d263818b0e38e39754490dbf213dc722cb799832d7c6caae77478f8e2f5263cfea663356b6ff91f7d2a42aca958f354848a8ec3a5d903fb462b9d76c579b57137e0b2fd142dd5e776d8c688e7eaa450fb007d3ccc1e55c93dc47a83230e3710192f1a834dcd2399c6fa6a19"], 0x52) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) [ 717.544759][ T34] audit: type=1804 audit(1608903531.793:223): pid=21539 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir485317324/syzkaller.5RLsHB/568/file0" dev="sda1" ino=16097 res=1 errno=0 [ 717.578267][T21543] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:52 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0x6, 0x0, 0x7) 13:38:52 executing program 4: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) 13:38:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x8801, &(0x7f0000000000)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}, {@fat=@dos1xfloppy='dos1xfloppy'}, {@fat=@check_strict='check=strict'}]}) 13:38:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5f", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:52 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xf, 0x0, 0x0) 13:38:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={0x0}}, 0x0) [ 717.994101][T21560] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:54 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0xed) close(r0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 13:38:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3d) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x7) 13:38:54 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x7e) 13:38:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:54 executing program 4: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) 13:38:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3d) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x7) 13:38:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x7, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/135, 0x32, 0x87, 0x1}, 0x20) 13:38:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 720.661804][T21602] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3d) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x7) 13:38:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8971, &(0x7f0000000000)={'batadv_slave_1\x00'}) [ 720.869055][ T3192] usb 5-1: new high-speed USB device number 13 using dummy_hcd 13:38:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) [ 721.409068][ T3192] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 721.418169][ T3192] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 721.430038][ T3192] usb 5-1: Product: syz [ 721.434234][ T3192] usb 5-1: Manufacturer: syz [ 721.442178][ T3192] usb 5-1: SerialNumber: syz [ 721.500718][ T3192] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 722.148918][ T3192] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 722.354230][ T8464] usb 5-1: USB disconnect, device number 13 [ 723.198743][ T3192] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 723.206497][ T3192] ath9k_htc: Failed to initialize the device [ 723.216386][ T8464] usb 5-1: ath9k_htc: USB layer deinitialized 13:38:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 13:38:57 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="caafeb94410b"}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000ec0)) 13:38:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:38:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:57 executing program 4: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) 13:38:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@struct={0x2, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000180)=""/135, 0x34, 0x87, 0x1}, 0x20) 13:38:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4000000, &(0x7f00000002c0), 0x0, &(0x7f0000000300)={[], [{@audit='audit'}]}) [ 723.810445][T21656] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:38:58 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:38:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x1005000, &(0x7f0000000040)) [ 724.008899][T14600] usb 5-1: new high-speed USB device number 14 using dummy_hcd 13:38:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 724.205055][T21673] ptrace attach of "/root/syz-executor.3"[21671] was attempted by "/root/syz-executor.3"[21673] [ 724.394988][T21683] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 724.528844][T14600] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 724.546703][T14600] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 724.567455][T14600] usb 5-1: Product: syz [ 724.578267][T14600] usb 5-1: Manufacturer: syz [ 724.590622][T14600] usb 5-1: SerialNumber: syz [ 724.649835][T14600] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 725.258833][T14600] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 725.463894][ T8464] usb 5-1: USB disconnect, device number 14 [ 726.318631][T14600] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 726.325649][T14600] ath9k_htc: Failed to initialize the device [ 726.333092][ T8464] usb 5-1: ath9k_htc: USB layer deinitialized 13:39:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000000)={[{@fat=@showexec='showexec'}]}) 13:39:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:39:01 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:39:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000180)={0x1, 0x0, 0x20, 0x0, 0x0, 0x0}) 13:39:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:39:01 executing program 4: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x44, &(0x7f0000000000)=ANY=[@ANYBLOB="3d8d004e"]) 13:39:01 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) [ 726.859455][T21721] ptrace attach of "/root/syz-executor.3"[21717] was attempted by "/root/syz-executor.3"[21721] 13:39:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001740)="f03ac46d5245aeb12fd35aab304ed5b978cc7747d69c34ebfeddc3cba1cba6ed8e2f6c44a4f75743429c30ae2cdec9d27dddd305a48f344de8801d98f4d8dfb9dd680ad4cc7678394b07e9dbb2322b4dff23fa2da45380ebcf7e414aa12d05c311d7e7c449ff76f5c83e8a65ae40319198a1034ef42474826606365ddae30cae6411bffa72e5ae8c4533350df67e076c0d9d97d902799c58418bab8fcaad207b2beb1029613d266536bcf809126d57a0efa85a49e390cac221ed5d73cd3c37bc86ae1ab6cb939c2cd9b7c6aed1ab17cb3198cc665b69b053bd07b9f2e3bacacdb0e718f1ed8fccf3b3f4cfb33a161bfafffe3bb00fc89ada05", 0xf9) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @dev}, 0x10) bind$packet(r0, &(0x7f0000000000)={0x11, 0x1a, 0x0, 0x1, 0x40, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x14) 13:39:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 726.859950][T21712] FAT-fs (loop1): bogus number of reserved sectors [ 726.860002][T21712] FAT-fs (loop1): Can't find a valid FAT filesystem 13:39:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) [ 726.918681][T21722] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 726.945075][T21712] FAT-fs (loop1): bogus number of reserved sectors [ 726.945100][T21712] FAT-fs (loop1): Can't find a valid FAT filesystem [ 727.109191][ T9797] usb 5-1: new high-speed USB device number 15 using dummy_hcd [ 727.123857][T21735] ptrace attach of "/root/syz-executor.3"[21734] was attempted by "/root/syz-executor.3"[21735] 13:39:01 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x284001, 0x0) fcntl$getown(r0, 0x9) 13:39:01 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_freezer_state(r0, 0x0, 0xeffd) [ 727.339664][T21746] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:39:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) [ 727.628843][ T9797] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 727.645824][ T9797] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 727.672093][ T9797] usb 5-1: Product: syz [ 727.692830][ T9797] usb 5-1: Manufacturer: syz [ 727.716623][ T9797] usb 5-1: SerialNumber: syz [ 727.769884][ T9797] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 728.348694][ T9797] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 728.558043][ T8464] usb 5-1: USB disconnect, device number 15 [ 729.438492][ T9797] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 729.445486][ T9797] ath9k_htc: Failed to initialize the device [ 729.456659][ T8464] usb 5-1: ath9k_htc: USB layer deinitialized 13:39:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:39:04 executing program 1: timer_create(0x0, &(0x7f00000010c0)={0x0, 0x39, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001100)) 13:39:04 executing program 0: pipe2(&(0x7f00000003c0)={0xffffffffffffffff}, 0x0) flistxattr(r0, &(0x7f0000000040)=""/55, 0x37) 13:39:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:39:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:39:04 executing program 4: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x44, 0x0) 13:39:04 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000003400)='/dev/ptmx\x00', 0x6200, 0x0) 13:39:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:39:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "9d"}]}}, &(0x7f00000000c0)=""/200, 0x2a, 0xc8, 0x1}, 0x20) [ 730.067893][T21800] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:39:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c", 0xa2}], 0x4, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:39:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:39:04 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f00000001c0)='fuse\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id'}}) 13:39:04 executing program 1: pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$evdev(r0, &(0x7f0000000440)=[{}], 0xfffffffffffffdef) 13:39:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) [ 730.278333][ T2999] usb 5-1: new high-speed USB device number 16 using dummy_hcd 13:39:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) [ 730.434618][T21820] fuse: Bad value for 'user_id' 13:39:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 13:39:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) [ 730.669015][T21834] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 730.808591][ T2999] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 730.817823][ T2999] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 730.848310][ T2999] usb 5-1: Product: syz [ 730.852546][ T2999] usb 5-1: Manufacturer: syz [ 730.857177][ T2999] usb 5-1: SerialNumber: syz [ 730.929480][ T2999] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 731.528360][ T2999] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 731.734004][ T8464] usb 5-1: USB disconnect, device number 16 13:39:06 executing program 4: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x44, 0x0) 13:39:06 executing program 1: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x5) 13:39:06 executing program 0: pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_mount_image$fuse(&(0x7f00000004c0)='fuse\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}}) 13:39:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7) 13:39:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x1289, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001200)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80c00) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000480)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000013c0)=""/143, &(0x7f0000001480)=0x8f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0000000201030000000000000000000000000008000840000000007012f7fbea8ab0ad1cc67e1b590adcdf61ce5e4d24139df278060923eff98f2513266c8aef61a7fca558089c54fe725b8f0bb972ac2719b087279d961645ae4d70645d177e4394b165826ce58dc04efdef8a2cf774417ffc9c9167f5d16b2d9bd877aa75bfb852bff187e3a6a3e7007b8e4125fccb7117b900018e31a227c729a52a9284e8685f9880f717dd93ff85d1c733aa559d50d7ad48e726657a085b207ba774a09cbd639940c4381df1b22158e139b54f26e87c"], 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000011c0)=0x8000, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001240), 0x4) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80c0e}, 0xc, &(0x7f0000001340)={&(0x7f00000015c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04022cbd7000fddbdf250100000048000180140002006c6f000000000000000000000000000008000100578c39ebb27f0a99be9d0e9a3a7d31de8a1c7cea4bbc2eff90f58ff75b4ebe70f966a3e3f4327da96786ddee6946672dce0ccf64dc3f5ee5ba1cb2157d502289a677aa232bd557203a20b6dbc0f32ad26a7d2597421f7472c29630160104cc9e4225a538f97bd9f77a00a174369add0581bf089b5eacda1b2f095fcb26f1a5d6185b26493b3c8dc01749e480f399aef6326d6bac482f696cb71a5ff166251f96a9cf03f868f26a79b231eb57f1b9506679bd9a6b239efa0df3f39318fbd1ae5b91f8f7e070a262abb379cc2b6417071081804dbb", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f310000140002006772653000"/40], 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000081) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 732.337676][T21854] fuse: Bad value for 'user_id' [ 732.347684][T21856] loop1: detected capacity change from 264192 to 0 [ 732.405320][T21863] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 13:39:06 executing program 0: perf_event_open(&(0x7f0000001140)={0x8, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:39:06 executing program 1: mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='/dev/loop0\x00') r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x1, 0x1, 0x209e28, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/130}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/66}, 0x20) [ 732.558268][ T2999] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 732.565546][ T2999] ath9k_htc: Failed to initialize the device [ 732.579569][ T8464] usb 5-1: ath9k_htc: USB layer deinitialized 13:39:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) sendto$packet(r0, 0x0, 0x0, 0x20008000, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0xee, 0x6, @dev={[], 0x2}}, 0x14) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) sendto$packet(r2, 0x0, 0x0, 0x20008000, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0xee, 0x6, @dev={[], 0x2}}, 0x14) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={0x0, @in={0x2, 0x4e22, @private=0xa010102}, @hci={0x1f, 0x3, 0x3}, @sco, 0x7ff, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x8, 0x800}) r5 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) sendto$packet(r5, 0x0, 0x0, 0x20008000, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0xee, 0x6, @dev={[], 0x2}}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0x0, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x851}, 0x20000090) getrandom(0x0, 0x18, 0x0) [ 732.848174][T21880] BUG: kernel NULL pointer dereference, address: 0000000000000008 [ 732.856028][T21880] #PF: supervisor read access in kernel mode [ 732.862011][T21880] #PF: error_code(0x0000) - not-present page [ 732.868001][T21880] PGD 29226067 P4D 29226067 PUD 12ea3067 PMD 0 [ 732.874275][T21880] Oops: 0000 [#1] PREEMPT SMP KASAN [ 732.879484][T21880] CPU: 1 PID: 21880 Comm: syz-executor.1 Not tainted 5.10.0-syzkaller #0 [ 732.888037][T21880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.898206][T21880] RIP: 0010:kasan_record_aux_stack+0x77/0xb0 [ 732.904214][T21880] Code: 48 f7 fe 8b 47 24 49 89 f0 48 29 d3 8d 70 ff 41 0f af f0 48 01 ce 48 39 f3 48 0f 46 f3 e8 81 e9 ff ff bf 00 08 00 00 48 89 c3 <8b> 40 08 89 43 0c e8 1e e6 ff ff 89 43 08 5b c3 48 8b 50 08 48 c7 [ 732.923844][T21880] RSP: 0018:ffffc90006857c20 EFLAGS: 00010046 [ 732.929929][T21880] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88808a400000 [ 732.937912][T21880] RDX: 0000000000000010 RSI: ffff88808a400000 RDI: 0000000000000800 [ 732.945980][T21880] RBP: ffffffff818701f0 R08: 0000000000400000 R09: 000000000000002e [ 732.954239][T21880] R10: ffffffff8132b7ea R11: 000000000000003f R12: 0000000000035b40 [ 732.962224][T21880] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 732.970227][T21880] FS: 00007f62cfd4a700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 732.979173][T21880] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 732.985798][T21880] CR2: 0000000000000008 CR3: 0000000083400000 CR4: 00000000001506e0 [ 732.993782][T21880] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 733.001770][T21880] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 733.009859][T21880] Call Trace: [ 733.013141][T21880] call_rcu+0xbb/0x710 [ 733.017205][T21880] free_htab_elem+0x174/0x1c0 [ 733.022030][T21880] htab_map_update_elem+0x61c/0x790 [ 733.027248][T21880] bpf_map_update_value.isra.0+0x770/0x980 [ 733.033055][T21880] __do_sys_bpf+0x2dea/0x50f0 [ 733.037729][T21880] ? bpf_link_get_from_fd+0x110/0x110 [ 733.043133][T21880] ? _copy_to_user+0xdc/0x150 [ 733.047829][T21880] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 733.054094][T21880] ? put_timespec64+0xcb/0x120 [ 733.058879][T21880] ? ns_to_timespec64+0xc0/0xc0 [ 733.063756][T21880] ? syscall_enter_from_user_mode+0x1d/0x50 [ 733.069675][T21880] do_syscall_64+0x2d/0x70 [ 733.074110][T21880] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 733.080028][T21880] RIP: 0033:0x45e149 [ 733.083930][T21880] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 733.103558][T21880] RSP: 002b:00007f62cfd49c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 733.111986][T21880] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 733.120010][T21880] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000002 [ 733.127994][T21880] RBP: 000000000119bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 733.136081][T21880] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 733.144041][T21880] R13: 00007ffdec0a558f R14: 00007f62cfd4a9c0 R15: 000000000119bf8c [ 733.152004][T21880] Modules linked in: [ 733.155879][T21880] CR2: 0000000000000008 [ 733.160019][T21880] ---[ end trace 924dd88a2c7d4393 ]--- [ 733.165453][T21880] RIP: 0010:kasan_record_aux_stack+0x77/0xb0 [ 733.171429][T21880] Code: 48 f7 fe 8b 47 24 49 89 f0 48 29 d3 8d 70 ff 41 0f af f0 48 01 ce 48 39 f3 48 0f 46 f3 e8 81 e9 ff ff bf 00 08 00 00 48 89 c3 <8b> 40 08 89 43 0c e8 1e e6 ff ff 89 43 08 5b c3 48 8b 50 08 48 c7 [ 733.191021][T21880] RSP: 0018:ffffc90006857c20 EFLAGS: 00010046 [ 733.197074][T21880] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88808a400000 [ 733.205029][T21880] RDX: 0000000000000010 RSI: ffff88808a400000 RDI: 0000000000000800 [ 733.212990][T21880] RBP: ffffffff818701f0 R08: 0000000000400000 R09: 000000000000002e [ 733.221148][T21880] R10: ffffffff8132b7ea R11: 000000000000003f R12: 0000000000035b40 [ 733.229125][T21880] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 733.237088][T21880] FS: 00007f62cfd4a700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 733.246057][T21880] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 733.252628][T21880] CR2: 0000000000000008 CR3: 0000000083400000 CR4: 00000000001506e0 [ 733.260589][T21880] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 733.268594][T21880] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 733.276574][T21880] Kernel panic - not syncing: Fatal exception [ 733.283515][T21880] Kernel Offset: disabled [ 733.287848][T21880] Rebooting in 86400 seconds..