cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb508658b4ee013640d018b42ef6b0bad0382b10312016f6f8a27abd546a7f97074c7d19ae3c5b681bdbfc153992faa2201253a403eaa4c392d129b5c41fb87915f23e4c2e8c5a5a7ffe84194b4968313677ab56ac00304c5aa3771e4d6fdc6f288456333dcf20c29fcc8bef8e69aec24000000000000"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:44:26 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:44:26 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
getsockopt(0xffffffffffffffff, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
[ 678.882613][T19049] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 687.851940][ C0] not chained 130000 origins
[ 687.856579][ C0] CPU: 0 PID: 624 Comm: kworker/u4:24 Not tainted 5.6.0-rc7-syzkaller #0
[ 687.864985][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 687.875060][ C0] Workqueue: krdsd rds_connect_worker
[ 687.880434][ C0] Call Trace:
[ 687.883721][ C0]
[ 687.886587][ C0] dump_stack+0x1c9/0x220
[ 687.890939][ C0] kmsan_internal_chain_origin+0x6f/0x130
[ 687.896662][ C0] ? should_fail+0x72/0x9e0
[ 687.901169][ C0] ? ret_from_fork+0x35/0x40
[ 687.905848][ C0] ? __msan_metadata_ptr_for_load_4+0x10/0x20
[ 687.911913][ C0] ? arch_stack_walk+0x34c/0x3e0
[ 687.916854][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 687.922063][ C0] ? __should_failslab+0x1f6/0x290
[ 687.927180][ C0] ? kmsan_get_metadata+0x4f/0x180
[ 687.932296][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 687.938105][ C0] ? __msan_metadata_ptr_for_store_2+0x13/0x20
[ 687.944267][ C0] ? tcp_parse_options+0x1ada/0x1b90
[ 687.949582][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 687.954784][ C0] __msan_chain_origin+0x50/0x90
[ 687.959731][ C0] tcp_conn_request+0x13ce/0x4d10
[ 687.964757][ C0] ? rb_first+0x31/0x100
[ 687.969030][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 687.974266][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 687.979474][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 687.984682][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 687.990515][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 687.995733][ C0] tcp_v4_conn_request+0x19b/0x240
[ 688.000862][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 688.005982][ C0] ? inet6_sk_rx_dst_set+0x3d0/0x3d0
[ 688.011272][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 688.016653][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 688.021865][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 688.027673][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 688.033755][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 688.038964][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 688.043567][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 688.048122][ C0] ? tcp_filter+0xf0/0xf0
[ 688.052456][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 688.057945][ C0] ip_local_deliver+0x62a/0x7c0
[ 688.062828][ C0] ? ip_local_deliver+0x7c0/0x7c0
[ 688.067856][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0
[ 688.073498][ C0] ip_rcv+0x6cf/0x750
[ 688.077495][ C0] ? ip_rcv_core+0x1270/0x1270
[ 688.082265][ C0] ? ip_local_deliver_finish+0x350/0x350
[ 688.087901][ C0] process_backlog+0xf0b/0x1410
[ 688.092761][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 688.097969][ C0] ? ip_local_deliver_finish+0x350/0x350
[ 688.103618][ C0] ? rps_trigger_softirq+0x2e0/0x2e0
[ 688.108914][ C0] net_rx_action+0x786/0x1aa0
[ 688.113613][ C0] ? net_tx_action+0xc30/0xc30
[ 688.118385][ C0] __do_softirq+0x311/0x83d
[ 688.122937][ C0] do_softirq_own_stack+0x49/0x80
[ 688.127961][ C0]
[ 688.130910][ C0] __local_bh_enable_ip+0x184/0x1d0
[ 688.136130][ C0] local_bh_enable+0x36/0x40
[ 688.140849][ C0] ip_finish_output2+0x2115/0x2610
[ 688.145967][ C0] ? ctnetlink_net_exit_batch+0x180/0x180
[ 688.151870][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0
[ 688.157882][ C0] __ip_finish_output+0xaa7/0xd80
[ 688.162931][ C0] ip_finish_output+0x166/0x410
[ 688.167807][ C0] ip_output+0x593/0x680
[ 688.172077][ C0] ? ip_mc_finish_output+0x6c0/0x6c0
[ 688.177367][ C0] ? ip_finish_output+0x410/0x410
[ 688.182402][ C0] __ip_queue_xmit+0x1b5c/0x21a0
[ 688.187347][ C0] ? kmsan_set_origin_checked+0x95/0xf0
[ 688.192918][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 688.198134][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 688.203347][ C0] ip_queue_xmit+0xcc/0xf0
[ 688.207774][ C0] ? tcp_v4_fill_cb+0x580/0x580
[ 688.212632][ C0] __tcp_transmit_skb+0x439c/0x6090
[ 688.217834][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 688.223680][ C0] tcp_connect+0x4337/0x6920
[ 688.228276][ C0] ? __msan_poison_alloca+0xf0/0x120
[ 688.233560][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 688.238794][ C0] tcp_v4_connect+0x21fd/0x2370
[ 688.243683][ C0] ? tcp_twsk_unique+0xba0/0xba0
[ 688.248626][ C0] __inet_stream_connect+0x2fb/0x1340
[ 688.254009][ C0] ? __local_bh_enable_ip+0x97/0x1d0
[ 688.259312][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 688.264525][ C0] inet_stream_connect+0x101/0x180
[ 688.269656][ C0] ? __inet_stream_connect+0x1340/0x1340
[ 688.275314][ C0] rds_tcp_conn_path_connect+0x8a7/0xb80
[ 688.280972][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 688.286188][ C0] ? rds_tcp_state_change+0x390/0x390
[ 688.291597][ C0] rds_connect_worker+0x2a6/0x470
[ 688.296625][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 688.302713][ C0] ? rds_addr_cmp+0x200/0x200
[ 688.307386][ C0] process_one_work+0x1555/0x1f40
[ 688.312439][ C0] worker_thread+0xef6/0x2450
[ 688.317149][ C0] kthread+0x4b5/0x4f0
[ 688.321221][ C0] ? process_one_work+0x1f40/0x1f40
[ 688.326429][ C0] ? kthread_blkcg+0xf0/0xf0
[ 688.331024][ C0] ret_from_fork+0x35/0x40
[ 688.335447][ C0] Uninit was stored to memory at:
[ 688.340470][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 688.346196][ C0] __msan_chain_origin+0x50/0x90
[ 688.351127][ C0] tcp_conn_request+0x1781/0x4d10
[ 688.356143][ C0] tcp_v4_conn_request+0x19b/0x240
[ 688.361261][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 688.366285][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 688.371662][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 688.376257][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 688.380761][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 688.386218][ C0] ip_local_deliver+0x62a/0x7c0
[ 688.391066][ C0] ip_rcv+0x6cf/0x750
[ 688.395046][ C0] process_backlog+0xf0b/0x1410
[ 688.399894][ C0] net_rx_action+0x786/0x1aa0
[ 688.404572][ C0] __do_softirq+0x311/0x83d
[ 688.409061][ C0]
[ 688.411381][ C0] Uninit was stored to memory at:
[ 688.416402][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 688.422122][ C0] __msan_chain_origin+0x50/0x90
[ 688.427062][ C0] tcp_openreq_init_rwin+0xc22/0xc80
[ 688.432343][ C0] tcp_conn_request+0x33d7/0x4d10
[ 688.437365][ C0] tcp_v4_conn_request+0x19b/0x240
[ 688.442473][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 688.447506][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 688.452881][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 688.457469][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 688.461972][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 688.467431][ C0] ip_local_deliver+0x62a/0x7c0
[ 688.472274][ C0] ip_rcv+0x6cf/0x750
[ 688.476259][ C0] process_backlog+0xf0b/0x1410
[ 688.481209][ C0] net_rx_action+0x786/0x1aa0
[ 688.486058][ C0] __do_softirq+0x311/0x83d
[ 688.490550][ C0]
[ 688.492868][ C0] Uninit was stored to memory at:
[ 688.497888][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 688.503613][ C0] __msan_chain_origin+0x50/0x90
[ 688.508552][ C0] tcp_conn_request+0x1781/0x4d10
[ 688.513571][ C0] tcp_v4_conn_request+0x19b/0x240
[ 688.518676][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 688.523696][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 688.529065][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 688.533653][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 688.538325][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 688.543794][ C0] ip_local_deliver+0x62a/0x7c0
[ 688.548645][ C0] ip_rcv+0x6cf/0x750
[ 688.552631][ C0] process_backlog+0xf0b/0x1410
[ 688.557552][ C0] net_rx_action+0x786/0x1aa0
[ 688.562257][ C0] __do_softirq+0x311/0x83d
[ 688.566748][ C0]
[ 688.569072][ C0] Uninit was stored to memory at:
[ 688.574096][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 688.579815][ C0] __msan_chain_origin+0x50/0x90
[ 688.584759][ C0] tcp_openreq_init_rwin+0xc22/0xc80
[ 688.590055][ C0] tcp_conn_request+0x33d7/0x4d10
[ 688.595081][ C0] tcp_v4_conn_request+0x19b/0x240
[ 688.600194][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 688.605218][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 688.610588][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 688.615356][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 688.619942][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 688.625397][ C0] ip_local_deliver+0x62a/0x7c0
[ 688.630239][ C0] ip_rcv+0x6cf/0x750
[ 688.634221][ C0] process_backlog+0xf0b/0x1410
[ 688.639070][ C0] net_rx_action+0x786/0x1aa0
[ 688.643747][ C0] __do_softirq+0x311/0x83d
[ 688.648237][ C0]
[ 688.650554][ C0] Uninit was stored to memory at:
[ 688.655573][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 688.661287][ C0] __msan_chain_origin+0x50/0x90
[ 688.666218][ C0] tcp_conn_request+0x1781/0x4d10
[ 688.671240][ C0] tcp_v4_conn_request+0x19b/0x240
[ 688.676344][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 688.681371][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 688.686824][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 688.691412][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 688.695911][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 688.701376][ C0] ip_local_deliver+0x62a/0x7c0
[ 688.706221][ C0] ip_rcv+0x6cf/0x750
[ 688.710203][ C0] process_backlog+0xf0b/0x1410
[ 688.715057][ C0] net_rx_action+0x786/0x1aa0
[ 688.719733][ C0] __do_softirq+0x311/0x83d
[ 688.724220][ C0]
[ 688.726542][ C0] Uninit was stored to memory at:
[ 688.731576][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 688.737293][ C0] __msan_chain_origin+0x50/0x90
[ 688.742250][ C0] tcp_openreq_init_rwin+0xc22/0xc80
[ 688.747616][ C0] tcp_conn_request+0x33d7/0x4d10
[ 688.752650][ C0] tcp_v4_conn_request+0x19b/0x240
[ 688.757764][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 688.762796][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 688.768177][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 688.772774][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 688.777276][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 688.782737][ C0] ip_local_deliver+0x62a/0x7c0
[ 688.787585][ C0] ip_rcv+0x6cf/0x750
[ 688.791572][ C0] process_backlog+0xf0b/0x1410
[ 688.796430][ C0] net_rx_action+0x786/0x1aa0
[ 688.801103][ C0] __do_softirq+0x311/0x83d
[ 688.805589][ C0]
[ 688.807912][ C0] Uninit was stored to memory at:
[ 688.812940][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 688.818654][ C0] __msan_chain_origin+0x50/0x90
[ 688.823586][ C0] tcp_conn_request+0x1781/0x4d10
[ 688.828607][ C0] tcp_v4_conn_request+0x19b/0x240
[ 688.833718][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 688.838737][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 688.844101][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 688.848687][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 688.853187][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 688.858645][ C0] ip_local_deliver+0x62a/0x7c0
[ 688.863490][ C0] ip_rcv+0x6cf/0x750
[ 688.867468][ C0] process_backlog+0xf0b/0x1410
[ 688.872322][ C0] net_rx_action+0x786/0x1aa0
[ 688.876998][ C0] __do_softirq+0x311/0x83d
[ 688.881487][ C0]
[ 688.883813][ C0] Uninit was created at:
[ 688.888052][ C0] kmsan_save_stack_with_flags+0x3c/0x90
[ 688.893685][ C0] kmsan_alloc_page+0x12a/0x310
[ 688.898649][ C0] __alloc_pages_nodemask+0x5712/0x5e80
[ 688.904205][ C0] alloc_pages_current+0x67d/0x990
[ 688.909320][ C0] alloc_slab_page+0x111/0x12f0
[ 688.914171][ C0] new_slab+0x2bc/0x1130
[ 688.918676][ C0] ___slab_alloc+0x14a3/0x2040
[ 688.923438][ C0] kmem_cache_alloc+0xb23/0xd70
[ 688.928289][ C0] inet_reqsk_alloc+0xac/0x830
[ 688.933052][ C0] tcp_conn_request+0x753/0x4d10
[ 688.937987][ C0] tcp_v4_conn_request+0x19b/0x240
[ 688.943096][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 688.948472][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 688.953064][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 688.957568][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 688.963282][ C0] ip_local_deliver+0x62a/0x7c0
[ 688.968127][ C0] ip_sublist_rcv+0x11fa/0x13c0
[ 688.972998][ C0] ip_list_rcv+0x8eb/0x950
[ 688.977427][ C0] __netif_receive_skb_list_core+0x1311/0x1380
[ 688.983581][ C0] netif_receive_skb_list_internal+0xf62/0x1620
[ 688.989825][ C0] napi_complete_done+0x2ef/0xb60
[ 688.994850][ C0] virtqueue_napi_complete+0xb9/0x1f0
[ 689.000217][ C0] virtnet_poll+0x1468/0x19f0
[ 689.004890][ C0] net_rx_action+0x786/0x1aa0
[ 689.009569][ C0] __do_softirq+0x311/0x83d
17:44:36 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
shutdown(r1, 0x0)
recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:44:36 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
r1 = ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004)
write$P9_RSETATTR(r1, 0x0, 0x0)
17:44:36 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
getsockopt(0xffffffffffffffff, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:44:36 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(0x0, 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:44:36 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a", 0x22}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
17:44:36 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
[ 689.688235][T19081] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:44:37 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
r1 = ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004)
write$P9_RSETATTR(r1, 0x0, 0x0)
17:44:37 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
fcntl$dupfd(r0, 0x0, r1)
r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r2, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
[ 689.816056][T19089] selinux_netlink_send: 20 callbacks suppressed
[ 689.816105][T19089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19089 comm=syz-executor.4
17:44:37 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
17:44:37 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(0x0, 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
[ 689.976447][T19089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19089 comm=syz-executor.4
[ 690.075487][T19089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19089 comm=syz-executor.4
[ 690.187732][T19089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19089 comm=syz-executor.4
[ 690.317136][T19089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19089 comm=syz-executor.4
17:44:37 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
r1 = ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004)
write$P9_RSETATTR(r1, 0x0, 0x0)
[ 690.427274][T19089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19089 comm=syz-executor.4
17:44:37 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
[ 690.545137][T19089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19089 comm=syz-executor.4
[ 690.635150][T19089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19089 comm=syz-executor.4
[ 690.723899][T19089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19089 comm=syz-executor.4
[ 690.792472][T19089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19089 comm=syz-executor.4
[ 699.847801][ C1] not chained 140000 origins
[ 699.852449][ C1] CPU: 1 PID: 255 Comm: kworker/u4:10 Not tainted 5.6.0-rc7-syzkaller #0
[ 699.862167][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 699.872247][ C1] Workqueue: krdsd rds_connect_worker
[ 699.877626][ C1] Call Trace:
[ 699.880915][ C1]
[ 699.883777][ C1] dump_stack+0x1c9/0x220
[ 699.888119][ C1] kmsan_internal_chain_origin+0x6f/0x130
[ 699.893861][ C1] ? should_fail+0x72/0x9e0
[ 699.898368][ C1] ? ret_from_fork+0x35/0x40
[ 699.902975][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20
[ 699.909047][ C1] ? arch_stack_walk+0x34c/0x3e0
[ 699.914001][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 699.919230][ C1] ? __should_failslab+0x1f6/0x290
[ 699.924368][ C1] ? kmsan_get_metadata+0x4f/0x180
[ 699.929495][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 699.935327][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20
[ 699.941487][ C1] ? tcp_parse_options+0x1ada/0x1b90
[ 699.946847][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 699.952061][ C1] __msan_chain_origin+0x50/0x90
[ 699.957015][ C1] tcp_conn_request+0x13ce/0x4d10
[ 699.962049][ C1] ? rb_first+0x31/0x100
[ 699.966302][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 699.971516][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 699.976718][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 699.981937][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 699.987756][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 699.992998][ C1] tcp_v4_conn_request+0x19b/0x240
[ 699.998139][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 700.003189][ C1] ? inet6_sk_rx_dst_set+0x3d0/0x3d0
[ 700.008483][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 700.013864][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 700.019104][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 700.024922][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 700.031184][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 700.036406][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 700.041055][ C1] tcp_v4_rcv+0x3f39/0x4d00
[ 700.045623][ C1] ? tcp_filter+0xf0/0xf0
[ 700.049977][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 700.055461][ C1] ip_local_deliver+0x62a/0x7c0
[ 700.060353][ C1] ? ip_local_deliver+0x7c0/0x7c0
[ 700.065385][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0
[ 700.071035][ C1] ip_rcv+0x6cf/0x750
[ 700.075031][ C1] ? ip_rcv_core+0x1270/0x1270
[ 700.079798][ C1] ? ip_local_deliver_finish+0x350/0x350
[ 700.085435][ C1] process_backlog+0xf0b/0x1410
[ 700.090294][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 700.095494][ C1] ? ip_local_deliver_finish+0x350/0x350
[ 700.101244][ C1] ? rps_trigger_softirq+0x2e0/0x2e0
[ 700.106528][ C1] net_rx_action+0x786/0x1aa0
[ 700.111235][ C1] ? net_tx_action+0xc30/0xc30
[ 700.116003][ C1] __do_softirq+0x311/0x83d
[ 700.120521][ C1] do_softirq_own_stack+0x49/0x80
[ 700.125535][ C1]
[ 700.128482][ C1] __local_bh_enable_ip+0x184/0x1d0
[ 700.133704][ C1] local_bh_enable+0x36/0x40
[ 700.138301][ C1] ip_finish_output2+0x2115/0x2610
[ 700.143416][ C1] ? ctnetlink_net_exit_batch+0x180/0x180
[ 700.149156][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0
[ 700.155173][ C1] __ip_finish_output+0xaa7/0xd80
[ 700.160222][ C1] ip_finish_output+0x166/0x410
[ 700.165095][ C1] ip_output+0x593/0x680
[ 700.169363][ C1] ? ip_mc_finish_output+0x6c0/0x6c0
[ 700.174649][ C1] ? ip_finish_output+0x410/0x410
[ 700.179785][ C1] __ip_queue_xmit+0x1b5c/0x21a0
[ 700.184733][ C1] ? kmsan_set_origin_checked+0x95/0xf0
[ 700.190299][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 700.195519][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 700.200727][ C1] ip_queue_xmit+0xcc/0xf0
[ 700.205151][ C1] ? tcp_v4_fill_cb+0x580/0x580
[ 700.210000][ C1] __tcp_transmit_skb+0x439c/0x6090
[ 700.215207][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 700.221048][ C1] tcp_connect+0x4337/0x6920
[ 700.225658][ C1] ? __msan_poison_alloca+0xf0/0x120
[ 700.230964][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 700.236202][ C1] tcp_v4_connect+0x21fd/0x2370
[ 700.241108][ C1] ? tcp_twsk_unique+0xba0/0xba0
[ 700.246058][ C1] __inet_stream_connect+0x2fb/0x1340
[ 700.251443][ C1] ? __local_bh_enable_ip+0x97/0x1d0
[ 700.256745][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 700.261956][ C1] inet_stream_connect+0x101/0x180
[ 700.267072][ C1] ? __inet_stream_connect+0x1340/0x1340
[ 700.272708][ C1] rds_tcp_conn_path_connect+0x8a7/0xb80
[ 700.278353][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 700.283556][ C1] ? rds_tcp_state_change+0x390/0x390
[ 700.288931][ C1] rds_connect_worker+0x2a6/0x470
[ 700.293953][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 700.300024][ C1] ? rds_addr_cmp+0x200/0x200
[ 700.304697][ C1] process_one_work+0x1555/0x1f40
[ 700.309749][ C1] worker_thread+0xef6/0x2450
[ 700.314468][ C1] kthread+0x4b5/0x4f0
[ 700.318546][ C1] ? process_one_work+0x1f40/0x1f40
[ 700.323758][ C1] ? kthread_blkcg+0xf0/0xf0
[ 700.328352][ C1] ret_from_fork+0x35/0x40
[ 700.332778][ C1] Uninit was stored to memory at:
[ 700.337803][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 700.343522][ C1] __msan_chain_origin+0x50/0x90
[ 700.348448][ C1] tcp_conn_request+0x1781/0x4d10
[ 700.353456][ C1] tcp_v4_conn_request+0x19b/0x240
[ 700.358553][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 700.363561][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 700.368918][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 700.373494][ C1] tcp_v4_rcv+0x3f39/0x4d00
[ 700.377984][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 700.383424][ C1] ip_local_deliver+0x62a/0x7c0
[ 700.388263][ C1] ip_rcv+0x6cf/0x750
[ 700.392234][ C1] process_backlog+0xf0b/0x1410
[ 700.397101][ C1] net_rx_action+0x786/0x1aa0
[ 700.401772][ C1] __do_softirq+0x311/0x83d
[ 700.406268][ C1]
[ 700.408855][ C1] Uninit was stored to memory at:
[ 700.413879][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 700.419588][ C1] __msan_chain_origin+0x50/0x90
[ 700.424515][ C1] tcp_openreq_init_rwin+0xc22/0xc80
[ 700.429799][ C1] tcp_conn_request+0x33d7/0x4d10
[ 700.434823][ C1] tcp_v4_conn_request+0x19b/0x240
[ 700.439924][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 700.444934][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 700.450291][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 700.454879][ C1] tcp_v4_rcv+0x3f39/0x4d00
[ 700.459368][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 700.464820][ C1] ip_local_deliver+0x62a/0x7c0
[ 700.469659][ C1] ip_rcv+0x6cf/0x750
[ 700.473629][ C1] process_backlog+0xf0b/0x1410
[ 700.478464][ C1] net_rx_action+0x786/0x1aa0
[ 700.483126][ C1] __do_softirq+0x311/0x83d
[ 700.487627][ C1]
[ 700.489939][ C1] Uninit was stored to memory at:
[ 700.494948][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 700.500651][ C1] __msan_chain_origin+0x50/0x90
[ 700.505573][ C1] tcp_conn_request+0x1781/0x4d10
[ 700.510595][ C1] tcp_v4_conn_request+0x19b/0x240
[ 700.515689][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 700.520699][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 700.526052][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 700.530631][ C1] tcp_v4_rcv+0x3f39/0x4d00
[ 700.535134][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 700.540575][ C1] ip_local_deliver+0x62a/0x7c0
[ 700.545407][ C1] ip_rcv+0x6cf/0x750
[ 700.549377][ C1] process_backlog+0xf0b/0x1410
[ 700.554213][ C1] net_rx_action+0x786/0x1aa0
[ 700.558879][ C1] __do_softirq+0x311/0x83d
[ 700.563366][ C1]
[ 700.565685][ C1] Uninit was stored to memory at:
[ 700.570714][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 700.577294][ C1] __msan_chain_origin+0x50/0x90
[ 700.582225][ C1] tcp_openreq_init_rwin+0xc22/0xc80
[ 700.587503][ C1] tcp_conn_request+0x33d7/0x4d10
[ 700.592520][ C1] tcp_v4_conn_request+0x19b/0x240
[ 700.597617][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 700.602627][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 700.607996][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 700.612572][ C1] tcp_v4_rcv+0x3f39/0x4d00
[ 700.617060][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 700.622520][ C1] ip_local_deliver+0x62a/0x7c0
[ 700.627362][ C1] ip_rcv+0x6cf/0x750
[ 700.631338][ C1] process_backlog+0xf0b/0x1410
[ 700.636305][ C1] net_rx_action+0x786/0x1aa0
[ 700.640978][ C1] __do_softirq+0x311/0x83d
[ 700.645464][ C1]
[ 700.647802][ C1] Uninit was stored to memory at:
[ 700.652831][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 700.658549][ C1] __msan_chain_origin+0x50/0x90
[ 700.663475][ C1] tcp_conn_request+0x1781/0x4d10
[ 700.668488][ C1] tcp_v4_conn_request+0x19b/0x240
[ 700.673583][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 700.678602][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 700.683981][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 700.688557][ C1] tcp_v4_rcv+0x3f39/0x4d00
[ 700.693051][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 700.698492][ C1] ip_local_deliver+0x62a/0x7c0
[ 700.703326][ C1] ip_rcv+0x6cf/0x750
[ 700.707299][ C1] process_backlog+0xf0b/0x1410
[ 700.712137][ C1] net_rx_action+0x786/0x1aa0
[ 700.716799][ C1] __do_softirq+0x311/0x83d
[ 700.721279][ C1]
[ 700.723593][ C1] Uninit was stored to memory at:
[ 700.728604][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 700.734314][ C1] __msan_chain_origin+0x50/0x90
[ 700.739245][ C1] tcp_openreq_init_rwin+0xc22/0xc80
[ 700.744511][ C1] tcp_conn_request+0x33d7/0x4d10
[ 700.749522][ C1] tcp_v4_conn_request+0x19b/0x240
[ 700.754628][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 700.759636][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 700.764991][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 700.769567][ C1] tcp_v4_rcv+0x3f39/0x4d00
[ 700.774053][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 700.779620][ C1] ip_local_deliver+0x62a/0x7c0
[ 700.784466][ C1] ip_rcv+0x6cf/0x750
[ 700.788448][ C1] process_backlog+0xf0b/0x1410
[ 700.793305][ C1] net_rx_action+0x786/0x1aa0
[ 700.797983][ C1] __do_softirq+0x311/0x83d
[ 700.802472][ C1]
[ 700.804803][ C1] Uninit was stored to memory at:
[ 700.809823][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 700.815531][ C1] __msan_chain_origin+0x50/0x90
[ 700.820465][ C1] tcp_conn_request+0x1781/0x4d10
[ 700.825477][ C1] tcp_v4_conn_request+0x19b/0x240
[ 700.830574][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 700.835586][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 700.840942][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 700.845517][ C1] tcp_v4_rcv+0x3f39/0x4d00
[ 700.850006][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 700.855450][ C1] ip_local_deliver+0x62a/0x7c0
[ 700.860283][ C1] ip_rcv+0x6cf/0x750
[ 700.864251][ C1] process_backlog+0xf0b/0x1410
[ 700.869088][ C1] net_rx_action+0x786/0x1aa0
[ 700.873751][ C1] __do_softirq+0x311/0x83d
[ 700.878241][ C1]
[ 700.880549][ C1] Uninit was created at:
[ 700.884779][ C1] kmsan_save_stack_with_flags+0x3c/0x90
[ 700.890421][ C1] kmsan_alloc_page+0x12a/0x310
[ 700.895263][ C1] __alloc_pages_nodemask+0x5712/0x5e80
[ 700.900803][ C1] alloc_pages_current+0x67d/0x990
[ 700.905907][ C1] alloc_slab_page+0x111/0x12f0
[ 700.910747][ C1] new_slab+0x2bc/0x1130
[ 700.914983][ C1] ___slab_alloc+0x14a3/0x2040
[ 700.919744][ C1] kmem_cache_alloc+0xb23/0xd70
[ 700.924697][ C1] inet_reqsk_alloc+0xac/0x830
[ 700.929447][ C1] tcp_conn_request+0x753/0x4d10
[ 700.934374][ C1] tcp_v4_conn_request+0x19b/0x240
[ 700.939492][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 700.944855][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 700.949433][ C1] tcp_v4_rcv+0x3f39/0x4d00
[ 700.953925][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 700.959372][ C1] ip_local_deliver+0x62a/0x7c0
[ 700.964220][ C1] ip_sublist_rcv+0x11fa/0x13c0
[ 700.969068][ C1] ip_list_rcv+0x8eb/0x950
[ 700.973482][ C1] __netif_receive_skb_list_core+0x1311/0x1380
[ 700.980065][ C1] netif_receive_skb_list_internal+0xf62/0x1620
[ 700.986290][ C1] napi_complete_done+0x2ef/0xb60
[ 700.991302][ C1] virtqueue_napi_complete+0xb9/0x1f0
[ 700.996663][ C1] virtnet_poll+0x1468/0x19f0
[ 701.001327][ C1] net_rx_action+0x786/0x1aa0
[ 701.005988][ C1] __do_softirq+0x311/0x83d
17:44:48 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
shutdown(r1, 0x0)
recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:44:48 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="010002000000000048b88a96ff969a4db16bc904b7985780d46626f620205b977047d055198470eb3f3b4b62ab077002fc8941098fb776d1b0313e7d28ee970b4b6406f6f6cfde90ca91e4d4347f8875499794e8b5ab95de3890d662e077d5b6b2a0121232344196d3c003000000e741d909afceeba84fc017ef13c6a03f4496ac09d5010400000000000091e57095c31962fd9bff54a7b2dc3a30a5e2ea475be303c50ef19a19f5be2615ec58a378c9271f5ed0319b373ea1606f87439b2fd1193806831d4b4ef34ce7ee284b75d7d2f45dff0d45cdcd65ce0dce3d89b7a3a7f6cd4cdd8f8053f32acdb192f7a15827edcebd8373495c9ac23431497c44b802fc1a89952192592c7420a222f3c282da09b2b729504ca5880000000000000000000000005bb57bcd6bb540403727f75663f85b7f1a365eb952e0d5017bd8adb507025870248a6ca6e6ee1f7bbd5187a8943315033c787978fcbcfd82eb777038805d618137033540747af6db017304cbbf8e85b9422b806301e500000000000000000000295376a7cbcbdde000000000000000000000000000000000e77f8044e87324757bc08664c674bbd0b657903d0ccb7be0b205f3a0959a0ddb9bfab83322170bc089d3651e2b5a1c1a097a3f315328f98893a8ba46e8c3c89088591d13f3a77417e7f3eec714e88199e37baa2c46a32081db131933eef0cc260f7df32bb5ebee18662dc95976d353ae7378276ac483d666aa64b2397b476bafb07a0399e4ad0fd0660dd61559d856ab834e2934b0fdb448b5ddda704143489de5c606d4768ab3adc8b368b0b64b352b2f16462263965741559cc9d1fa26f6c18cba98069d8309ed75a4385c4d20ee8ffa6abc1e9ddaf9007a88b47e63688afae990d4a94547b08f822cc03b0d4b3b685c19116f380a3bde470d99f9ae45033d14c249fffbff7e6b9769fae969eaef90322c6400caef8bd04c412a8f782780eaffa58671864da87d1b3f304bd8618a686a29ce7e96a1a19929165bfe37753c55b5bf7f3a357944b63917fdbf9350d22162"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(0x0, 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:44:48 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
17:44:48 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004)
17:44:48 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:44:48 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
[ 701.168978][T19116] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 701.286036][T19131] selinux_netlink_send: 5 callbacks suppressed
[ 701.286087][T19131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19131 comm=syz-executor.4
17:44:48 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:44:48 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:44:48 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
[ 701.450959][T19131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19131 comm=syz-executor.4
17:44:48 executing program 3:
ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5414, 0x20000004)
[ 701.579658][T19131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19131 comm=syz-executor.4
[ 701.681197][T19131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19131 comm=syz-executor.4
[ 701.806170][T19131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19131 comm=syz-executor.4
[ 701.977416][T19131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19131 comm=syz-executor.4
17:44:49 executing program 3:
ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5414, 0x20000004)
[ 702.090936][T19131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19131 comm=syz-executor.4
17:44:49 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
[ 702.252859][T19131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19131 comm=syz-executor.4
[ 702.341030][T19131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19131 comm=syz-executor.4
[ 702.433287][T19131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19131 comm=syz-executor.4
[ 711.799416][ C0] not chained 150000 origins
[ 711.804062][ C0] CPU: 0 PID: 624 Comm: kworker/u4:24 Not tainted 5.6.0-rc7-syzkaller #0
[ 711.812468][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 711.822534][ C0] Workqueue: krdsd rds_connect_worker
[ 711.827911][ C0] Call Trace:
[ 711.831200][ C0]
[ 711.834150][ C0] dump_stack+0x1c9/0x220
[ 711.838499][ C0] kmsan_internal_chain_origin+0x6f/0x130
[ 711.844262][ C0] ? xfrm_lookup_route+0x2c1/0x370
[ 711.849400][ C0] ? ip_route_output_flow+0x35a/0x3d0
[ 711.854786][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 711.861206][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 711.866419][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 711.872241][ C0] ? __msan_metadata_ptr_for_store_4+0x13/0x20
[ 711.878397][ C0] ? tcp_select_initial_window+0x60d/0x6c0
[ 711.884229][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 711.889436][ C0] __msan_chain_origin+0x50/0x90
[ 711.894387][ C0] tcp_openreq_init_rwin+0xc22/0xc80
[ 711.899698][ C0] tcp_conn_request+0x33d7/0x4d10
[ 711.904760][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 711.910004][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 711.915234][ C0] tcp_v4_conn_request+0x19b/0x240
[ 711.920363][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 711.925398][ C0] ? inet6_sk_rx_dst_set+0x3d0/0x3d0
[ 711.930693][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 711.936070][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 711.941272][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 711.947081][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 711.953169][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 711.958378][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 711.962985][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 711.967559][ C0] ? tcp_filter+0xf0/0xf0
[ 711.971905][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 711.977386][ C0] ip_local_deliver+0x62a/0x7c0
[ 711.982535][ C0] ? ip_local_deliver+0x7c0/0x7c0
[ 711.987567][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0
[ 711.993214][ C0] ip_rcv+0x6cf/0x750
[ 711.997212][ C0] ? ip_rcv_core+0x1270/0x1270
[ 712.001982][ C0] ? ip_local_deliver_finish+0x350/0x350
[ 712.007624][ C0] process_backlog+0xf0b/0x1410
[ 712.012503][ C0] ? ip_local_deliver_finish+0x350/0x350
[ 712.018156][ C0] ? rps_trigger_softirq+0x2e0/0x2e0
[ 712.023459][ C0] net_rx_action+0x786/0x1aa0
[ 712.028171][ C0] ? net_tx_action+0xc30/0xc30
[ 712.032945][ C0] __do_softirq+0x311/0x83d
[ 712.037467][ C0] do_softirq_own_stack+0x49/0x80
[ 712.042494][ C0]
[ 712.045448][ C0] __local_bh_enable_ip+0x184/0x1d0
[ 712.050668][ C0] local_bh_enable+0x36/0x40
[ 712.055264][ C0] ip_finish_output2+0x2115/0x2610
[ 712.060375][ C0] ? ctnetlink_net_exit_batch+0x180/0x180
[ 712.066107][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0
[ 712.072128][ C0] __ip_finish_output+0xaa7/0xd80
[ 712.077172][ C0] ip_finish_output+0x166/0x410
[ 712.082050][ C0] ip_output+0x593/0x680
[ 712.086322][ C0] ? ip_mc_finish_output+0x6c0/0x6c0
[ 712.091625][ C0] ? ip_finish_output+0x410/0x410
[ 712.096670][ C0] __ip_queue_xmit+0x1b5c/0x21a0
[ 712.101615][ C0] ? kmsan_set_origin_checked+0x95/0xf0
[ 712.107172][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 712.112410][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 712.117627][ C0] ip_queue_xmit+0xcc/0xf0
[ 712.122055][ C0] ? tcp_v4_fill_cb+0x580/0x580
[ 712.126911][ C0] __tcp_transmit_skb+0x439c/0x6090
[ 712.132122][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 712.137966][ C0] tcp_connect+0x4337/0x6920
[ 712.142574][ C0] ? __msan_poison_alloca+0xf0/0x120
[ 712.147870][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 712.153106][ C0] tcp_v4_connect+0x21fd/0x2370
[ 712.158001][ C0] ? tcp_twsk_unique+0xba0/0xba0
[ 712.162943][ C0] __inet_stream_connect+0x2fb/0x1340
[ 712.168325][ C0] ? __local_bh_enable_ip+0x97/0x1d0
[ 712.173632][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 712.178857][ C0] inet_stream_connect+0x101/0x180
[ 712.183978][ C0] ? __inet_stream_connect+0x1340/0x1340
[ 712.189624][ C0] rds_tcp_conn_path_connect+0x8a7/0xb80
[ 712.195274][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 712.200478][ C0] ? rds_tcp_state_change+0x390/0x390
[ 712.205849][ C0] rds_connect_worker+0x2a6/0x470
[ 712.210891][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 712.216966][ C0] ? rds_addr_cmp+0x200/0x200
[ 712.221641][ C0] process_one_work+0x1555/0x1f40
[ 712.226709][ C0] worker_thread+0xef6/0x2450
[ 712.231439][ C0] kthread+0x4b5/0x4f0
[ 712.235514][ C0] ? process_one_work+0x1f40/0x1f40
[ 712.240738][ C0] ? kthread_blkcg+0xf0/0xf0
[ 712.245345][ C0] ret_from_fork+0x35/0x40
[ 712.249777][ C0] Uninit was stored to memory at:
[ 712.254822][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 712.260555][ C0] __msan_chain_origin+0x50/0x90
[ 712.265509][ C0] tcp_conn_request+0x1781/0x4d10
[ 712.270539][ C0] tcp_v4_conn_request+0x19b/0x240
[ 712.275729][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 712.280764][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 712.286129][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 712.290714][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 712.295208][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 712.300654][ C0] ip_local_deliver+0x62a/0x7c0
[ 712.305500][ C0] ip_rcv+0x6cf/0x750
[ 712.309470][ C0] process_backlog+0xf0b/0x1410
[ 712.314317][ C0] net_rx_action+0x786/0x1aa0
[ 712.319072][ C0] __do_softirq+0x311/0x83d
[ 712.323552][ C0]
[ 712.325863][ C0] Uninit was stored to memory at:
[ 712.330876][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 712.336583][ C0] __msan_chain_origin+0x50/0x90
[ 712.341512][ C0] tcp_openreq_init_rwin+0xc22/0xc80
[ 712.346791][ C0] tcp_conn_request+0x33d7/0x4d10
[ 712.351800][ C0] tcp_v4_conn_request+0x19b/0x240
[ 712.356897][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 712.361909][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 712.367266][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 712.371842][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 712.376336][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 712.381782][ C0] ip_local_deliver+0x62a/0x7c0
[ 712.386614][ C0] ip_rcv+0x6cf/0x750
[ 712.390582][ C0] process_backlog+0xf0b/0x1410
[ 712.395416][ C0] net_rx_action+0x786/0x1aa0
[ 712.400078][ C0] __do_softirq+0x311/0x83d
[ 712.404555][ C0]
[ 712.406864][ C0] Uninit was stored to memory at:
[ 712.411873][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 712.417579][ C0] __msan_chain_origin+0x50/0x90
[ 712.422501][ C0] tcp_conn_request+0x1781/0x4d10
[ 712.427512][ C0] tcp_v4_conn_request+0x19b/0x240
[ 712.432605][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 712.437624][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 712.442978][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 712.447555][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 712.452043][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 712.457483][ C0] ip_local_deliver+0x62a/0x7c0
[ 712.462315][ C0] ip_rcv+0x6cf/0x750
[ 712.466295][ C0] process_backlog+0xf0b/0x1410
[ 712.471134][ C0] net_rx_action+0x786/0x1aa0
[ 712.475815][ C0] __do_softirq+0x311/0x83d
[ 712.480297][ C0]
[ 712.482729][ C0] Uninit was stored to memory at:
[ 712.487751][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 712.493505][ C0] __msan_chain_origin+0x50/0x90
[ 712.498476][ C0] tcp_openreq_init_rwin+0xc22/0xc80
[ 712.503751][ C0] tcp_conn_request+0x33d7/0x4d10
[ 712.508768][ C0] tcp_v4_conn_request+0x19b/0x240
[ 712.513885][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 712.518918][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 712.524276][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 712.528855][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 712.533361][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 712.538807][ C0] ip_local_deliver+0x62a/0x7c0
[ 712.543640][ C0] ip_rcv+0x6cf/0x750
[ 712.547621][ C0] process_backlog+0xf0b/0x1410
[ 712.552457][ C0] net_rx_action+0x786/0x1aa0
[ 712.557120][ C0] __do_softirq+0x311/0x83d
[ 712.561609][ C0]
[ 712.563920][ C0] Uninit was stored to memory at:
[ 712.569018][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 712.574741][ C0] __msan_chain_origin+0x50/0x90
[ 712.579664][ C0] tcp_conn_request+0x1781/0x4d10
[ 712.584675][ C0] tcp_v4_conn_request+0x19b/0x240
[ 712.589771][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 712.594778][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 712.600148][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 712.604735][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 712.609237][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 712.614681][ C0] ip_local_deliver+0x62a/0x7c0
[ 712.619513][ C0] ip_rcv+0x6cf/0x750
[ 712.623487][ C0] process_backlog+0xf0b/0x1410
[ 712.628325][ C0] net_rx_action+0x786/0x1aa0
[ 712.632995][ C0] __do_softirq+0x311/0x83d
[ 712.637476][ C0]
[ 712.639786][ C0] Uninit was stored to memory at:
[ 712.644805][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 712.650520][ C0] __msan_chain_origin+0x50/0x90
[ 712.655445][ C0] tcp_openreq_init_rwin+0xc22/0xc80
[ 712.660810][ C0] tcp_conn_request+0x33d7/0x4d10
[ 712.665844][ C0] tcp_v4_conn_request+0x19b/0x240
[ 712.670949][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 712.675961][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 712.681322][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 712.685902][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 712.690391][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 712.695920][ C0] ip_local_deliver+0x62a/0x7c0
[ 712.700757][ C0] ip_rcv+0x6cf/0x750
[ 712.704728][ C0] process_backlog+0xf0b/0x1410
[ 712.709567][ C0] net_rx_action+0x786/0x1aa0
[ 712.714316][ C0] __do_softirq+0x311/0x83d
[ 712.718799][ C0]
[ 712.723632][ C0] Uninit was stored to memory at:
[ 712.728644][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 712.734349][ C0] __msan_chain_origin+0x50/0x90
[ 712.739276][ C0] tcp_conn_request+0x1781/0x4d10
[ 712.744297][ C0] tcp_v4_conn_request+0x19b/0x240
[ 712.749405][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 712.754420][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 712.759782][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 712.764361][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 712.768855][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 712.774297][ C0] ip_local_deliver+0x62a/0x7c0
[ 712.779147][ C0] ip_rcv+0x6cf/0x750
[ 712.783142][ C0] process_backlog+0xf0b/0x1410
[ 712.787990][ C0] net_rx_action+0x786/0x1aa0
[ 712.792663][ C0] __do_softirq+0x311/0x83d
[ 712.797262][ C0]
[ 712.799589][ C0] Uninit was created at:
[ 712.803829][ C0] kmsan_save_stack_with_flags+0x3c/0x90
[ 712.809451][ C0] kmsan_alloc_page+0x12a/0x310
[ 712.814293][ C0] __alloc_pages_nodemask+0x5712/0x5e80
[ 712.819827][ C0] alloc_pages_current+0x67d/0x990
[ 712.824935][ C0] alloc_slab_page+0x111/0x12f0
[ 712.829779][ C0] new_slab+0x2bc/0x1130
[ 712.834009][ C0] ___slab_alloc+0x14a3/0x2040
[ 712.838761][ C0] kmem_cache_alloc+0xb23/0xd70
[ 712.843604][ C0] inet_reqsk_alloc+0xac/0x830
[ 712.848352][ C0] tcp_conn_request+0x753/0x4d10
[ 712.853277][ C0] tcp_v4_conn_request+0x19b/0x240
[ 712.858377][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 712.863733][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 712.868308][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 712.872796][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 712.878760][ C0] ip_local_deliver+0x62a/0x7c0
[ 712.883609][ C0] ip_sublist_rcv+0x11fa/0x13c0
[ 712.888445][ C0] ip_list_rcv+0x8eb/0x950
[ 712.892849][ C0] __netif_receive_skb_list_core+0x1311/0x1380
[ 712.898988][ C0] netif_receive_skb_list_internal+0xf62/0x1620
[ 712.905229][ C0] napi_complete_done+0x2ef/0xb60
[ 712.910250][ C0] virtqueue_napi_complete+0xb9/0x1f0
[ 712.915611][ C0] virtnet_poll+0x1468/0x19f0
[ 712.920550][ C0] net_rx_action+0x786/0x1aa0
[ 712.925227][ C0] __do_softirq+0x311/0x83d
17:45:00 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(0xffffffffffffffff, r0)
shutdown(r1, 0x0)
recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:45:00 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:45:00 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:00 executing program 3:
ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5414, 0x20000004)
17:45:00 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
17:45:00 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:00 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
[ 713.392342][T19166] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:00 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004)
17:45:01 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
[ 713.525914][T19175] selinux_netlink_send: 5 callbacks suppressed
[ 713.525970][T19175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19175 comm=syz-executor.4
17:45:01 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
[ 713.661702][T19175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19175 comm=syz-executor.4
[ 713.704295][T19175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19175 comm=syz-executor.4
[ 713.793993][T19175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19175 comm=syz-executor.4
17:45:01 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(0xffffffffffffffff, r0)
shutdown(r1, 0x0)
recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
[ 713.883866][T19175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19175 comm=syz-executor.4
17:45:01 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
[ 714.003578][T19175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19175 comm=syz-executor.4
17:45:01 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004)
[ 714.089973][T19175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19175 comm=syz-executor.4
17:45:01 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
[ 714.194951][T19175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19175 comm=syz-executor.4
[ 714.283640][T19175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19175 comm=syz-executor.4
17:45:01 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
[ 714.410959][T19175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19175 comm=syz-executor.4
17:45:01 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(0xffffffffffffffff, r0)
shutdown(r1, 0x0)
recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:45:02 executing program 5:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:02 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678c3b72613662d97adf88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d08a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa617e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b90b0000c5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124140000f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999a8c48b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c229e0a71bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb508658b4ee013640d018b42ef6b0bad0382b10312016f6f8a27abd546a7f97074c7d19ae3c5b681bdbfc153992faa2201253a403eaa4c392d129b5c41fb87915f23e4c2e8c5a5a7ffe84194b4968313677ab56ac00304c5aa3771e4d6fdc6f288456333dcf20c29fcc8bef8e69aec24000000000000"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:02 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004)
17:45:02 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
17:45:02 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, 0xffffffffffffffff)
shutdown(r1, 0x0)
recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:45:02 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="010002000000000048b88a96ff969a4db16bc904b7985780d46626f620205b977047d055198470eb3f3b4b62ab077002fc8941098fb776d1b0313e7d28ee970b4b6406f6f6cfde90ca91e4d4347f8875499794e8b5ab95de3890d662e077d5b6b2a0121232344196d3c003000000e741d909afceeba84fc017ef13c6a03f4496ac09d5010400000000000091e57095c31962fd9bff54a7b2dc3a30a5e2ea475be303c50ef19a19f5be2615ec58a378c9271f5ed0319b373ea1606f87439b2fd1193806831d4b4ef34ce7ee284b75d7d2f45dff0d45cdcd65ce0dce3d89b7a3a7f6cd4cdd8f8053f32acdb192f7a15827edcebd8373495c9ac23431497c44b802fc1a89952192592c7420a222f3c282da09b2b729504ca5880000000000000000000000005bb57bcd6bb540403727f75663f85b7f1a365eb952e0d5017bd8adb507025870248a6ca6e6ee1f7bbd5187a8943315033c787978fcbcfd82eb777038805d618137033540747af6db017304cbbf8e85b9422b806301e500000000000000000000295376a7cbcbdde000000000000000000000000000000000e77f8044e87324757bc08664c674bbd0b657903d0ccb7be0b205f3a0959a0ddb9bfab83322170bc089d3651e2b5a1c1a097a3f315328f98893a8ba46e8c3c89088591d13f3a77417e7f3eec714e88199e37baa2c46a32081db131933eef0cc260f7df32bb5ebee18662dc95976d353ae7378276ac483d666aa64b2397b476bafb07a0399e4ad0fd0660dd61559d856ab834e2934b0fdb448b5ddda704143489de5c606d4768ab3adc8b368b0b64b352b2f16462263965741559cc9d1fa26f6c18cba98069d8309ed75a4385c4d20ee8ffa6abc1e9ddaf9007a88b47e63688afae990d4a94547b08f822cc03b0d4b3b685c19116f380a3bde470d99f9ae45033d14c249fffbff7e6b9769fae969eaef90322c6400caef8bd04c412a8f782780eaffa58671864da87d1b3f304bd8618a686a29ce7e96a1a19929165bfe37753c55b5bf7f3a357944b63917fdbf9350d22162"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
[ 715.012831][T19210] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:02 executing program 5:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:02 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
17:45:02 executing program 3:
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5414, 0x20000004)
17:45:02 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, 0xffffffffffffffff)
shutdown(r1, 0x0)
recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:45:03 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:45:03 executing program 5:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:03 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9", 0x3}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
17:45:03 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:03 executing program 3:
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5414, 0x20000004)
17:45:03 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, 0xffffffffffffffff)
shutdown(r1, 0x0)
recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:45:03 executing program 5:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:03 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:45:03 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9", 0x3}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
[ 716.236393][T19248] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:03 executing program 3:
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5414, 0x20000004)
17:45:04 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
shutdown(0xffffffffffffffff, 0x0)
recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:45:04 executing program 5:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:04 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:45:04 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9", 0x3}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
17:45:04 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCGPTPEER(r0, 0x5414, 0x0)
17:45:04 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:04 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
shutdown(0xffffffffffffffff, 0x0)
recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:45:04 executing program 5:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:04 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCGPTPEER(r0, 0x5414, 0x0)
17:45:04 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f8", 0x4}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
17:45:04 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="010002000000000048b88a96ff969a4db16bc904b7985780d46626f620205b977047d055198470eb3f3b4b62ab077002fc8941098fb776d1b0313e7d28ee970b4b6406f6f6cfde90ca91e4d4347f8875499794e8b5ab95de3890d662e077d5b6b2a0121232344196d3c003000000e741d909afceeba84fc017ef13c6a03f4496ac09d5010400000000000091e57095c31962fd9bff54a7b2dc3a30a5e2ea475be303c50ef19a19f5be2615ec58a378c9271f5ed0319b373ea1606f87439b2fd1193806831d4b4ef34ce7ee284b75d7d2f45dff0d45cdcd65ce0dce3d89b7a3a7f6cd4cdd8f8053f32acdb192f7a15827edcebd8373495c9ac23431497c44b802fc1a89952192592c7420a222f3c282da09b2b729504ca5880000000000000000000000005bb57bcd6bb540403727f75663f85b7f1a365eb952e0d5017bd8adb507025870248a6ca6e6ee1f7bbd5187a8943315033c787978fcbcfd82eb777038805d618137033540747af6db017304cbbf8e85b9422b806301e500000000000000000000295376a7cbcbdde000000000000000000000000000000000e77f8044e87324757bc08664c674bbd0b657903d0ccb7be0b205f3a0959a0ddb9bfab83322170bc089d3651e2b5a1c1a097a3f315328f98893a8ba46e8c3c89088591d13f3a77417e7f3eec714e88199e37baa2c46a32081db131933eef0cc260f7df32bb5ebee18662dc95976d353ae7378276ac483d666aa64b2397b476bafb07a0399e4ad0fd0660dd61559d856ab834e2934b0fdb448b5ddda704143489de5c606d4768ab3adc8b368b0b64b352b2f16462263965741559cc9d1fa26f6c18cba98069d8309ed75a4385c4d20ee8ffa6abc1e9ddaf9007a88b47e63688afae990d4a94547b08f822cc03b0d4b3b685c19116f380a3bde470d99f9ae45033d14c249fffbff7e6b9769fae969eaef90322c6400caef8bd04c412a8f782780eaffa58671864da87d1b3f304bd8618a686a29ce7e96a1a19929165bfe37753c55b5bf7f3a357944b63917fdbf9350d22162"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:45:05 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
shutdown(0xffffffffffffffff, 0x0)
recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
[ 717.580548][T19286] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:05 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f8", 0x4}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
17:45:05 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:05 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCGPTPEER(r0, 0x5414, 0x0)
17:45:05 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:45:05 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
shutdown(r1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:45:05 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:05 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f8", 0x4}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880)
17:45:05 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:05 executing program 3:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff})
write$P9_RGETLOCK(r0, 0x0, 0x0)
17:45:05 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="010002000000000048b88a96ff969a4db16bc904b7985780d46626f620205b977047d055198470eb3f3b4b62ab077002fc8941098fb776d1b0313e7d28ee970b4b6406f6f6cfde90ca91e4d4347f8875499794e8b5ab95de3890d662e077d5b6b2a0121232344196d3c003000000e741d909afceeba84fc017ef13c6a03f4496ac09d5010400000000000091e57095c31962fd9bff54a7b2dc3a30a5e2ea475be303c50ef19a19f5be2615ec58a378c9271f5ed0319b373ea1606f87439b2fd1193806831d4b4ef34ce7ee284b75d7d2f45dff0d45cdcd65ce0dce3d89b7a3a7f6cd4cdd8f8053f32acdb192f7a15827edcebd8373495c9ac23431497c44b802fc1a89952192592c7420a222f3c282da09b2b729504ca5880000000000000000000000005bb57bcd6bb540403727f75663f85b7f1a365eb952e0d5017bd8adb507025870248a6ca6e6ee1f7bbd5187a8943315033c787978fcbcfd82eb777038805d618137033540747af6db017304cbbf8e85b9422b806301e500000000000000000000295376a7cbcbdde000000000000000000000000000000000e77f8044e87324757bc08664c674bbd0b657903d0ccb7be0b205f3a0959a0ddb9bfab83322170bc089d3651e2b5a1c1a097a3f315328f98893a8ba46e8c3c89088591d13f3a77417e7f3eec714e88199e37baa2c46a32081db131933eef0cc260f7df32bb5ebee18662dc95976d353ae7378276ac483d666aa64b2397b476bafb07a0399e4ad0fd0660dd61559d856ab834e2934b0fdb448b5ddda704143489de5c606d4768ab3adc8b368b0b64b352b2f16462263965741559cc9d1fa26f6c18cba98069d8309ed75a4385c4d20ee8ffa6abc1e9ddaf9007a88b47e63688afae990d4a94547b08f822cc03b0d4b3b685c19116f380a3bde470d99f9ae45033d14c249fffbff7e6b9769fae969eaef90322c6400caef8bd04c412a8f782780eaffa58671864da87d1b3f304bd8618a686a29ce7e96a1a19929165bfe37753c55b5bf7f3a357944b63917fdbf9350d22162"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:45:06 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
shutdown(r1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:45:06 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:06 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x0)
[ 718.890309][T19324] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:06 executing program 3:
r0 = eventfd2(0x0, 0x0)
close(r0)
close(0xffffffffffffffff)
socket$inet_tcp(0x2, 0x1, 0x0)
getsockname$inet(r0, 0x0, &(0x7f0000000140))
[ 719.097379][T19332] selinux_netlink_send: 50 callbacks suppressed
[ 719.097428][T19332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19332 comm=syz-executor.4
17:45:06 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
shutdown(r1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x4000223, 0x0, 0x0)
17:45:06 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
[ 719.209606][T19332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19332 comm=syz-executor.4
[ 719.327114][T19332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19332 comm=syz-executor.4
17:45:06 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
[ 719.431839][T19332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19332 comm=syz-executor.4
[ 719.528895][T19332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19332 comm=syz-executor.4
[ 719.641996][T19332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19332 comm=syz-executor.4
[ 719.729693][T19332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19332 comm=syz-executor.4
[ 719.798134][T19332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19332 comm=syz-executor.4
[ 719.850278][T19332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19332 comm=syz-executor.4
[ 719.951424][T19332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19332 comm=syz-executor.4
17:45:07 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:07 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x0)
17:45:07 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00')
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0)
17:45:07 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
shutdown(r1, 0x0)
recvmmsg(r1, 0x0, 0x0, 0x0, 0x0)
17:45:07 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0)
ftruncate(r2, 0x7fff)
sendfile(r1, r2, 0x0, 0x8000fffffffd)
17:45:07 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
[ 720.405864][T19366] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:07 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0)
ftruncate(r2, 0x7fff)
sendfile(r1, r2, 0x0, 0x8000fffffffd)
17:45:07 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb9ac0955dae950402d8b4ac000000a0", 0x10)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f043686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e2f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d10b012d5763308bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x0)
17:45:07 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
shutdown(r1, 0x0)
recvmmsg(r1, 0x0, 0x0, 0x0, 0x0)
17:45:07 executing program 3:
r0 = memfd_create(&(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce\x00\x00\x00\x00\xc9\xad\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87j\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\x00\x00\xb7\xd6\xa5&);\x1br\xd2\xa4\xba\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca\xa3\x1c]<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f;A Y\x84\x17\x14\xa8\xb5\x0f\xc3i\x9a\x87W\x90h.\x8b\xf5\xf9\xc1\xf04\x9a\xf9DB|L\xbc^n\xd5\x85\xd7\xaf-}\xce\x0e\xcc{\xb1\x9d_\xb2BmU\xc2\xad2q\xd5t&v\x89O\xf0+Q?\xf5\x1eV\x8d[\x98\x11\f#\x13\xc7\xd9\x92\xcc\xf7\xfb\xd3\bGy\x98\x1b\xe7\x86i\xe1.\x1f\x9e\x8cPFYi\x94\x13\xddm\x9c\xbfV\xe7^@\xe0\xa3\xa5(\f\x18>94\xedZ\xa7\xe4\xb2\xb6.\bY\xa9\xff\xbb', 0x0)
pwrite64(r0, &(0x7f00000006c0)="2fa30b86560ade30954a085347e87281ed4ae0ebdd914a1049ff6105b97279b6fadb832a266988bceb6ac8fcb39e95dbd07b8be37e37f84d341055626c12ef54aee412f1c018b40aea22f9eba145249c5677248d6d6838280b7bc743faffb9e309518268ee18ce94076cdbb6cce4e83c16bd358ec9817e85f7adfe3a612ee08ebc385cea25acac9475291f41ee8dbd6983843158c2fdeb51e6ea1f67255a194550f48f85c65bb8f729be810be8dfb4deb45fdbf9990666ca85857d7134d938c3125bb288b27374fdc03a9540f4caebe63aded8c71f89a5894d8f794afb2032e5318cf4af08acb507511ce583d4b833fb8ecc06f8e54cade80c8898ea1aab711b86", 0x101, 0x0)
mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0)
symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000000)='./file0\x00')
setxattr(0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0)
17:45:07 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:08 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0)
ftruncate(r2, 0x7fff)
sendfile(r1, r2, 0x0, 0x8000fffffffd)
17:45:08 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, 0x0, &(0x7f0000000200))
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r6 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r6, 0x0, 0x4ffe0, 0x0)
[ 721.580956][T19391] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:09 executing program 0:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
mount(&(0x7f0000000200)=@sg0='/dev/sg0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x800000, 0x0)
17:45:09 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:09 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r1, r0)
getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x40)
17:45:09 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup2(r0, r0)
shutdown(r1, 0x0)
recvmmsg(r1, 0x0, 0x0, 0x0, 0x0)
17:45:09 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(0xffffffffffffffff, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:45:09 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:09 executing program 0:
pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
dup3(r1, r0, 0x0)
setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, 0x0, 0x0)
17:45:09 executing program 3:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000))
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
17:45:09 executing program 2:
r0 = socket$kcm(0x29, 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$kcm(0x2, 0x200000000000001, 0x0)
perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x24000844)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000300000000000c00095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f26fb0b71d0e6adfefcf1d8f7faf75e0f226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b32a83438810720a159cda903634e369a9e152ddcc7b1b85f3c4744aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c39e4b3449abe802f5ab3e89cf6c662ed4048d3b3e22278d00031e5388ee5c867ddd58211d6ececb0cd2b6d357b8580218ce740068725837074e468ee207d2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000000000000000000000160000000000020000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf449c3bfd09000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f292324b7ab7f7da31cf41ab11f12fb1e0a494034127de7c6592df1a6c64d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b544035a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e673e3296e52d337c56abf112874ec309baed0495f06d058a73651d6fe048ba6866adebab53168770a71ad901ace383e41d277b10392a912ffaf6f658f3f9cd16286744f83a83f138f8f92ef992239eafce5c1b3f97a297c9e49a0c3300ef7b7fb5f09e0c8a868a353409e34d3e82279637599f35ad380a447483cac394c7bbdcd0e3b1c39b6e00916de48a4e70f03cc4146a77af02c1d4cefd4a2b94c0aed8477dfa8ceefb467f05c6977c78cdbf37704ec73755539280b064bda144910fe050038ec9e47de7f298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06dddeb61799257ab55ff413c86ba9affb12ec757c7234c270246c878d01160e6c07bf6cf8809c3a0d462357b22515567230ad1e1f4933545fc3c741374211663f6b63b1dd044dd0a2768e825972ea3b77641467c89fa0f82e8440105051e5510a33dcda5e143fbfff161c12ca389cbe4c51b3fa00675cc175067d2a214f8c9d9b2ecf63b66c5fd9c26a54d43fa050b88d1d43a8645bd9109b7e7131421c0f39113be7664e08bdd7115c61afcb718cf3c4680b2f6c7a84a4e378a9b15bc20f49e298727340e87cdefb40e56e9cfad973347d0de7ba4754ff231a1b933d8f931ba3552b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2af79b8d4c2bf0f7a2cb032dad13007b82e6044f643fc8cd47ae636a5dbe9864a117d27326850a7c3b570863f532c218b10af13d7be94987005088a83880ccab9c9920c2d2af8c5e13d52c83ac3ba7c3ae6c08384865b66d2b4dcb5dd9cba16b64ebbbf8702ae12c77e6e34991af603e3856a346cf7f9fe0bc9f2a1a7506d35e5eb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c9eed00000000ab6648a9dea0b6c91996d65da6c24a"], &(0x7f0000000140)='GPL\x00'}, 0x48)
ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000003c0)={r1, r2})
17:45:09 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, 0x0, &(0x7f0000000200))
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r6 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r6, 0x0, 0x4ffe0, 0x0)
17:45:10 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(0xffffffffffffffff, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:45:10 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:10 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='hybla\x00', 0x6)
bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10)
sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14140d}, 0x10)
recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071")
17:45:10 executing program 3:
write$binfmt_script(0xffffffffffffffff, 0x0, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071")
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58)
close(r1)
[ 722.893695][T19430] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:10 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(0xffffffffffffffff, 0x7fff)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:45:10 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:10 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
dup2(r1, r0)
ioctl$TIOCVHANGUP(r0, 0x541b, 0x713000)
17:45:11 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, 0x0, &(0x7f0000000200))
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r6 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r6, 0x0, 0x4ffe0, 0x0)
17:45:11 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="010002000000000048b88a96ff969a4db16bc904b7985780d46626f620205b977047d055198470eb3f3b4b62ab077002fc8941098fb776d1b0313e7d28ee970b4b6406f6f6cfde90ca91e4d4347f8875499794e8b5ab95de3890d662e077d5b6b2a0121232344196d3c003000000e741d909afceeba84fc017ef13c6a03f4496ac09d5010400000000000091e57095c31962fd9bff54a7b2dc3a30a5e2ea475be303c50ef19a19f5be2615ec58a378c9271f5ed0319b373ea1606f87439b2fd1193806831d4b4ef34ce7ee284b75d7d2f45dff0d45cdcd65ce0dce3d89b7a3a7f6cd4cdd8f8053f32acdb192f7a15827edcebd8373495c9ac23431497c44b802fc1a89952192592c7420a222f3c282da09b2b729504ca5880000000000000000000000005bb57bcd6bb540403727f75663f85b7f1a365eb952e0d5017bd8adb507025870248a6ca6e6ee1f7bbd5187a8943315033c787978fcbcfd82eb777038805d618137033540747af6db017304cbbf8e85b9422b806301e500000000000000000000295376a7cbcbdde000000000000000000000000000000000e77f8044e87324757bc08664c674bbd0b657903d0ccb7be0b205f3a0959a0ddb9bfab83322170bc089d3651e2b5a1c1a097a3f315328f98893a8ba46e8c3c89088591d13f3a77417e7f3eec714e88199e37baa2c46a32081db131933eef0cc260f7df32bb5ebee18662dc95976d353ae7378276ac483d666aa64b2397b476bafb07a0399e4ad0fd0660dd61559d856ab834e2934b0fdb448b5ddda704143489de5c606d4768ab3adc8b368b0b64b352b2f16462263965741559cc9d1fa26f6c18cba98069d8309ed75a4385c4d20ee8ffa6abc1e9ddaf9007a88b47e63688afae990d4a94547b08f822cc03b0d4b3b685c19116f380a3bde470d99f9ae45033d14c249fffbff7e6b9769fae969eaef90322c6400caef8bd04c412a8f782780eaffa58671864da87d1b3f304bd8618a686a29ce7e96a1a19929165bfe37753c55b5bf7f3a357944b63917fdbf9350d22162"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x0)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
17:45:11 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(0xffffffffffffffff, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
17:45:11 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c)
write(r0, 0x0, 0x53)
17:45:11 executing program 3:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = socket$kcm(0xa, 0x2, 0x11)
setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r2 = socket$kcm(0xa, 0x2, 0x11)
setsockopt$sock_attach_bpf(r2, 0x29, 0x14, &(0x7f0000000080), 0x301)
close(r2)
17:45:11 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)
[ 724.207793][T19475] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:11 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="010002000000000048b88a96ff969a4db16bc904b7985780d46626f620205b977047d055198470eb3f3b4b62ab077002fc8941098fb776d1b0313e7d28ee970b4b6406f6f6cfde90ca91e4d4347f8875499794e8b5ab95de3890d662e077d5b6b2a0121232344196d3c003000000e741d909afceeba84fc017ef13c6a03f4496ac09d5010400000000000091e57095c31962fd9bff54a7b2dc3a30a5e2ea475be303c50ef19a19f5be2615ec58a378c9271f5ed0319b373ea1606f87439b2fd1193806831d4b4ef34ce7ee284b75d7d2f45dff0d45cdcd65ce0dce3d89b7a3a7f6cd4cdd8f8053f32acdb192f7a15827edcebd8373495c9ac23431497c44b802fc1a89952192592c7420a222f3c282da09b2b729504ca5880000000000000000000000005bb57bcd6bb540403727f75663f85b7f1a365eb952e0d5017bd8adb507025870248a6ca6e6ee1f7bbd5187a8943315033c787978fcbcfd82eb777038805d618137033540747af6db017304cbbf8e85b9422b806301e500000000000000000000295376a7cbcbdde000000000000000000000000000000000e77f8044e87324757bc08664c674bbd0b657903d0ccb7be0b205f3a0959a0ddb9bfab83322170bc089d3651e2b5a1c1a097a3f315328f98893a8ba46e8c3c89088591d13f3a77417e7f3eec714e88199e37baa2c46a32081db131933eef0cc260f7df32bb5ebee18662dc95976d353ae7378276ac483d666aa64b2397b476bafb07a0399e4ad0fd0660dd61559d856ab834e2934b0fdb448b5ddda704143489de5c606d4768ab3adc8b368b0b64b352b2f16462263965741559cc9d1fa26f6c18cba98069d8309ed75a4385c4d20ee8ffa6abc1e9ddaf9007a88b47e63688afae990d4a94547b08f822cc03b0d4b3b685c19116f380a3bde470d99f9ae45033d14c249fffbff7e6b9769fae969eaef90322c6400caef8bd04c412a8f782780eaffa58671864da87d1b3f304bd8618a686a29ce7e96a1a19929165bfe37753c55b5bf7f3a357944b63917fdbf9350d22162"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x0)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
[ 724.416437][T19482] selinux_netlink_send: 50 callbacks suppressed
[ 724.416488][T19482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19482 comm=syz-executor.4
17:45:12 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(0xffffffffffffffff, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
[ 724.566454][T19482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19482 comm=syz-executor.4
17:45:12 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
[ 724.664236][T19482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19482 comm=syz-executor.4
17:45:12 executing program 3:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$kcm(0xa, 0x922000000003, 0x11)
r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x10, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
[ 724.784117][T19482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19482 comm=syz-executor.4
[ 724.894021][T19482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19482 comm=syz-executor.4
17:45:12 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x0)
sendfile(r1, r3, 0x0, 0x8000fffffffd)
[ 724.985402][T19482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19482 comm=syz-executor.4
[ 725.071712][T19482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19482 comm=syz-executor.4
17:45:12 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(0xffffffffffffffff, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000000))
[ 725.157939][T19482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19482 comm=syz-executor.4
[ 725.249435][T19482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19482 comm=syz-executor.4
[ 725.349908][T19482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19482 comm=syz-executor.4
17:45:13 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:13 executing program 3:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
17:45:13 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000006400300bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffff212e640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c7272faa9b1ce9f821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908350000005ec1956bd8660bf36628dff1a15750ab7e780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182dc2333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6fed786b781ab1faa35d391516e43c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41ae2df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8a8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b09c7f97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a43f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1000000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)
17:45:13 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x0, 0x1, 0x0, &(0x7f0000000000))
17:45:13 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffd)
[ 725.952640][T19521] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:13 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:13 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x0, 0x1, 0x0, &(0x7f0000000000))
17:45:13 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="010002000000000048b88a96ff969a4db16bc904b7985780d46626f620205b977047d055198470eb3f3b4b62ab077002fc8941098fb776d1b0313e7d28ee970b4b6406f6f6cfde90ca91e4d4347f8875499794e8b5ab95de3890d662e077d5b6b2a0121232344196d3c003000000e741d909afceeba84fc017ef13c6a03f4496ac09d5010400000000000091e57095c31962fd9bff54a7b2dc3a30a5e2ea475be303c50ef19a19f5be2615ec58a378c9271f5ed0319b373ea1606f87439b2fd1193806831d4b4ef34ce7ee284b75d7d2f45dff0d45cdcd65ce0dce3d89b7a3a7f6cd4cdd8f8053f32acdb192f7a15827edcebd8373495c9ac23431497c44b802fc1a89952192592c7420a222f3c282da09b2b729504ca5880000000000000000000000005bb57bcd6bb540403727f75663f85b7f1a365eb952e0d5017bd8adb507025870248a6ca6e6ee1f7bbd5187a8943315033c787978fcbcfd82eb777038805d618137033540747af6db017304cbbf8e85b9422b806301e500000000000000000000295376a7cbcbdde000000000000000000000000000000000e77f8044e87324757bc08664c674bbd0b657903d0ccb7be0b205f3a0959a0ddb9bfab83322170bc089d3651e2b5a1c1a097a3f315328f98893a8ba46e8c3c89088591d13f3a77417e7f3eec714e88199e37baa2c46a32081db131933eef0cc260f7df32bb5ebee18662dc95976d353ae7378276ac483d666aa64b2397b476bafb07a0399e4ad0fd0660dd61559d856ab834e2934b0fdb448b5ddda704143489de5c606d4768ab3adc8b368b0b64b352b2f16462263965741559cc9d1fa26f6c18cba98069d8309ed75a4385c4d20ee8ffa6abc1e9ddaf9007a88b47e63688afae990d4a94547b08f822cc03b0d4b3b685c19116f380a3bde470d99f9ae45033d14c249fffbff7e6b9769fae969eaef90322c6400caef8bd04c412a8f782780eaffa58671864da87d1b3f304bd8618a686a29ce7e96a1a19929165bfe37753c55b5bf7f3a357944b63917fdbf9350d22162"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffd)
17:45:13 executing program 3:
r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x101242, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='\xe4\xff\xff\xff')
socket$kcm(0x11, 0x0, 0x0)
write$cgroup_int(r1, 0x0, 0x0)
17:45:14 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)
17:45:14 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x0, 0x1, 0x0, &(0x7f0000000000))
17:45:14 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:14 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffd)
17:45:14 executing program 3:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
getsockname(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x80)
ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x5451, 0x0)
[ 727.263389][T19557] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:14 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x0, 0x0, &(0x7f0000000000))
17:45:15 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="010002000000000048b88a96ff969a4db16bc904b7985780d46626f620205b977047d055198470eb3f3b4b62ab077002fc8941098fb776d1b0313e7d28ee970b4b6406f6f6cfde90ca91e4d4347f8875499794e8b5ab95de3890d662e077d5b6b2a0121232344196d3c003000000e741d909afceeba84fc017ef13c6a03f4496ac09d5010400000000000091e57095c31962fd9bff54a7b2dc3a30a5e2ea475be303c50ef19a19f5be2615ec58a378c9271f5ed0319b373ea1606f87439b2fd1193806831d4b4ef34ce7ee284b75d7d2f45dff0d45cdcd65ce0dce3d89b7a3a7f6cd4cdd8f8053f32acdb192f7a15827edcebd8373495c9ac23431497c44b802fc1a89952192592c7420a222f3c282da09b2b729504ca5880000000000000000000000005bb57bcd6bb540403727f75663f85b7f1a365eb952e0d5017bd8adb507025870248a6ca6e6ee1f7bbd5187a8943315033c787978fcbcfd82eb777038805d618137033540747af6db017304cbbf8e85b9422b806301e500000000000000000000295376a7cbcbdde000000000000000000000000000000000e77f8044e87324757bc08664c674bbd0b657903d0ccb7be0b205f3a0959a0ddb9bfab83322170bc089d3651e2b5a1c1a097a3f315328f98893a8ba46e8c3c89088591d13f3a77417e7f3eec714e88199e37baa2c46a32081db131933eef0cc260f7df32bb5ebee18662dc95976d353ae7378276ac483d666aa64b2397b476bafb07a0399e4ad0fd0660dd61559d856ab834e2934b0fdb448b5ddda704143489de5c606d4768ab3adc8b368b0b64b352b2f16462263965741559cc9d1fa26f6c18cba98069d8309ed75a4385c4d20ee8ffa6abc1e9ddaf9007a88b47e63688afae990d4a94547b08f822cc03b0d4b3b685c19116f380a3bde470d99f9ae45033d14c249fffbff7e6b9769fae969eaef90322c6400caef8bd04c412a8f782780eaffa58671864da87d1b3f304bd8618a686a29ce7e96a1a19929165bfe37753c55b5bf7f3a357944b63917fdbf9350d22162"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffd)
17:45:15 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:15 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
r2 = socket$kcm(0x11, 0x200000000000002, 0x300)
sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x173}, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={r2})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='.#-\x00')
r3 = socket$kcm(0x10, 0x2, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/128, 0x1f, 0x80, 0x1}, 0x20)
sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
17:45:15 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x0, 0x0, &(0x7f0000000000))
17:45:15 executing program 2:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc004743e, &(0x7f0000000680)='&@[\x00')
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00')
17:45:15 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffd)
[ 728.179111][T19582] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 728.197270][T19582] team0: Device macvtap0 failed to register rx_handler
17:45:15 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678c3b72613662d97adf88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d08a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa617e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b90b0000c5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124140000f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999a8c48b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c229e0a71bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb508658b4ee013640d018b42ef6b0bad0382b10312016f6f8a27abd546a7f97074c7d19ae3c5b681bdbfc153992faa2201253a403eaa4c392d129b5c41fb87915f23e4c2e8c5a5a7ffe84194b4968313677ab56ac00304c5aa3771e4d6fdc6f288456333dcf20c29fcc8bef8e69aec24000000000000"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:15 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x0, 0x0, &(0x7f0000000000))
17:45:16 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffd)
17:45:16 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
[ 729.192051][T19592] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
17:45:16 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x0)
17:45:16 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
r2 = socket$kcm(0x11, 0x200000000000002, 0x300)
sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x173}, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={r2})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='.#-\x00')
r3 = socket$kcm(0x10, 0x2, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/128, 0x1f, 0x80, 0x1}, 0x20)
sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
[ 729.418230][T19597] selinux_netlink_send: 41 callbacks suppressed
[ 729.418281][T19597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19597 comm=syz-executor.4
[ 729.539600][T19597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19597 comm=syz-executor.4
17:45:17 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, 0x0)
[ 729.663389][T19597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19597 comm=syz-executor.4
17:45:17 executing program 2:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
[ 729.803316][T19625] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 729.812062][T19597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19597 comm=syz-executor.4
[ 729.835664][T19625] team0: Device macvtap0 failed to register rx_handler
[ 729.887634][T19597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19597 comm=syz-executor.4
17:45:17 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="010002000000000048b88a96ff969a4db16bc904b7985780d46626f620205b977047d055198470eb3f3b4b62ab077002fc8941098fb776d1b0313e7d28ee970b4b6406f6f6cfde90ca91e4d4347f8875499794e8b5ab95de3890d662e077d5b6b2a0121232344196d3c003000000e741d909afceeba84fc017ef13c6a03f4496ac09d5010400000000000091e57095c31962fd9bff54a7b2dc3a30a5e2ea475be303c50ef19a19f5be2615ec58a378c9271f5ed0319b373ea1606f87439b2fd1193806831d4b4ef34ce7ee284b75d7d2f45dff0d45cdcd65ce0dce3d89b7a3a7f6cd4cdd8f8053f32acdb192f7a15827edcebd8373495c9ac23431497c44b802fc1a89952192592c7420a222f3c282da09b2b729504ca5880000000000000000000000005bb57bcd6bb540403727f75663f85b7f1a365eb952e0d5017bd8adb507025870248a6ca6e6ee1f7bbd5187a8943315033c787978fcbcfd82eb777038805d618137033540747af6db017304cbbf8e85b9422b806301e500000000000000000000295376a7cbcbdde000000000000000000000000000000000e77f8044e87324757bc08664c674bbd0b657903d0ccb7be0b205f3a0959a0ddb9bfab83322170bc089d3651e2b5a1c1a097a3f315328f98893a8ba46e8c3c89088591d13f3a77417e7f3eec714e88199e37baa2c46a32081db131933eef0cc260f7df32bb5ebee18662dc95976d353ae7378276ac483d666aa64b2397b476bafb07a0399e4ad0fd0660dd61559d856ab834e2934b0fdb448b5ddda704143489de5c606d4768ab3adc8b368b0b64b352b2f16462263965741559cc9d1fa26f6c18cba98069d8309ed75a4385c4d20ee8ffa6abc1e9ddaf9007a88b47e63688afae990d4a94547b08f822cc03b0d4b3b685c19116f380a3bde470d99f9ae45033d14c249fffbff7e6b9769fae969eaef90322c6400caef8bd04c412a8f782780eaffa58671864da87d1b3f304bd8618a686a29ce7e96a1a19929165bfe37753c55b5bf7f3a357944b63917fdbf9350d22162"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x0)
[ 729.999517][T19597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19597 comm=syz-executor.4
[ 730.126933][T19597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19597 comm=syz-executor.4
[ 730.264877][T19597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19597 comm=syz-executor.4
[ 730.371234][T19597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19597 comm=syz-executor.4
17:45:17 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
socket$kcm(0x2b, 0x1, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:18 executing program 2:
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0xe80, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a8ffffffff00000000122e25d386dd", 0x0, 0x3b, 0x0, 0x22d}, 0x28)
17:45:18 executing program 1:
open$dir(0x0, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x7c)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20004018, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81)
memfd_create(0x0, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0)
ftruncate(r3, 0x7fff)
sendfile(r1, r3, 0x0, 0x0)
17:45:18 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
socket$netlink(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r6 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r6, 0x0, 0x4ffe0, 0x0)
17:45:18 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, 0x0)
[ 731.144885][T19648] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19648 comm=syz-executor.4
17:45:18 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
r2 = socket$kcm(0x11, 0x200000000000002, 0x300)
sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x173}, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={r2})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='.#-\x00')
r3 = socket$kcm(0x10, 0x2, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/128, 0x1f, 0x80, 0x1}, 0x20)
sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
17:45:18 executing program 2:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
17:45:18 executing program 1:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1081004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa10c30, &(0x7f0000000280)={[{@noacl='noacl'}]})
[ 731.685643][T19655] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 731.703053][T19655] team0: Device macvtap0 failed to register rx_handler
17:45:19 executing program 5:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt(r0, 0x400000000000003a, 0x1, 0x0, 0x0)
17:45:19 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:19 executing program 2:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff})
r1 = dup(r0)
getsockopt$inet6_mtu(r1, 0x29, 0x43, 0x0, &(0x7f00000000c0))
17:45:19 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
socket$netlink(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r6 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r6, 0x0, 0x4ffe0, 0x0)
[ 732.278934][T19657] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5
[ 732.278934][T19657] Contact linux-ext4@vger.kernel.org if you think we should keep it.
[ 732.278934][T19657]
[ 732.414985][T19657] EXT4-fs (sda1): re-mounted. Opts: noacl,
17:45:19 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:19 executing program 2:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
recvmsg(r0, &(0x7f0000000600)={&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0, 0x0, 0x0, 0x1ef}, 0x0)
fcntl$F_SET_RW_HINT(r1, 0x3, 0x0)
17:45:20 executing program 1:
r0 = eventfd(0x0)
writev(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)="979266dedc556be6", 0x8}], 0x1)
timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc))
r1 = fcntl$dupfd(r0, 0x0, r0)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x0, {0x80}}, 0x14)
close(r1)
socket$inet_udp(0x2, 0x2, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0)
timer_settime(r2, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)
17:45:20 executing program 5:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$FS_IOC_FSGETXATTR(r0, 0x5450, 0x0)
17:45:20 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
r2 = socket$kcm(0x11, 0x200000000000002, 0x300)
sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x173}, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={r2})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='.#-\x00')
r3 = socket$kcm(0x10, 0x2, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/128, 0x1f, 0x80, 0x1}, 0x20)
sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
17:45:20 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
socket$netlink(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r6 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r6, 0x0, 0x4ffe0, 0x0)
17:45:20 executing program 2:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff})
getsockname(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x1de)
fcntl$F_GET_FILE_RW_HINT(r1, 0x8, 0x0)
17:45:21 executing program 5:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
recvmsg(r0, &(0x7f0000000600)={&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0, 0x0, 0x0, 0x1ef}, 0x0)
ioctl$sock_SIOCSIFBR(r1, 0x5452, &(0x7f0000000140)=@add_del={0x2, 0x0})
17:45:21 executing program 1:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
recvmsg(r0, &(0x7f0000000600)={&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0, 0x0, 0x0, 0x1ef}, 0x0)
ioctl$FS_IOC_GETFLAGS(r1, 0x5421, &(0x7f0000000040))
[ 733.822517][T19697] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 733.840859][T19697] team0: Device macvtap0 failed to register rx_handler
17:45:21 executing program 2:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
recvmsg(r0, &(0x7f0000000600)={&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0, 0x0, 0x0, 0x1ef}, 0x0)
ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x5452, &(0x7f00000000c0)={0x1, 'xfrm0\x00'})
17:45:21 executing program 0:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:21 executing program 1:
r0 = socket$inet_icmp(0x2, 0x2, 0x1)
ioctl$sock_SIOCDELRT(r0, 0x5421, &(0x7f0000001cc0)={0x2, @l2tp={0x2, 0x0, @loopback}, @nl, @sco={0x1f, @none}})
17:45:21 executing program 0:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:22 executing program 5:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl(r0, 0x5452, &(0x7f0000000080))
[ 734.917163][T19702] selinux_netlink_send: 29 callbacks suppressed
[ 734.917212][T19702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19702 comm=syz-executor.4
17:45:22 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff})
getsockname(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x1de)
write$P9_RSETATTR(r1, 0x0, 0x0)
[ 735.027992][T19702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19702 comm=syz-executor.4
17:45:22 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
r2 = socket$kcm(0x11, 0x200000000000002, 0x300)
sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x173}, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={r2})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='.#-\x00')
r3 = socket$kcm(0x10, 0x2, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000007000000005f5f30008b623b2765b0b8ed890781c624cd5bbe875a4b38a2de39cc7c68590327a781bff8ccd5f9c16c327a7d357aea7ec756527d3ae2943183f857daf10ef03565273cbd5e9b5afb03c83fdf13992d4b19ebfa30455f9e9cdb7ddebd78152284a38f7f778814ced734c08c391d30d75d3ce36cd555671eb5cba276819d0636cbd59d1adaa2b1b7d4669096348423b1995cd4430913731236b9dce42166a7bec61e7d04d64be7945cd5caafa3c5b588e85861403b123a4cf96033100dd1ea4aee2e8618a73fb1d7160437f98c1da8425a9a5e476762d572da9320eb47ed456a98272735806097d5078524bbc27aeb726fec125f4ea1006bbe9e3aba484aa4992a61c41e06e253e29e7669595cb0ca1cbacc626df8a665b119a1ddc7ae50c1ba7f063b6f9564e178d7c32a2db1a8c242150472c1fe2eac91b39fadc60b0ae4d624797c8b7dcb"], &(0x7f0000000280)=""/128, 0x1f, 0x80, 0x1}, 0x20)
sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:22 executing program 0:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
[ 735.134188][T19702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19702 comm=syz-executor.4
[ 735.253927][T19702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19702 comm=syz-executor.4
[ 735.336408][T19702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19702 comm=syz-executor.4
[ 735.465848][T19702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19702 comm=syz-executor.4
[ 735.513343][T19730] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 735.530764][T19730] team0: Device macvtap0 failed to register rx_handler
[ 735.573898][T19702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19702 comm=syz-executor.4
[ 735.682650][T19702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19702 comm=syz-executor.4
[ 735.770862][T19702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19702 comm=syz-executor.4
[ 735.817601][T19702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19702 comm=syz-executor.4
17:45:23 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:23 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10)
syz_emit_ethernet(0x86, &(0x7f0000000140)={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @multicast2=0xac1414bb, @broadcast=0xe0000001}, {0x0, 0x4e22, 0x53, 0x0, @wg=@cookie={0x3, 0x0, "72178e3038b01e064f4c54134d2927652792896a4e84580a", "f907881206ce30b61820e8ba477d229cce6ec4a761a8db8c8c666f83eacf066f"}}}}}}, 0x0)
readv(r0, &(0x7f0000000a00)=[{&(0x7f0000000080)=""/8, 0x4b}], 0x1)
17:45:23 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10)
syz_emit_ethernet(0x86, &(0x7f0000000140)={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @multicast2=0xac1414bb, @broadcast=0xe0000001}, {0x0, 0x4e22, 0x53, 0x0, @wg=@cookie={0x3, 0x0, "72178e3038b01e064f4c54134d2927652792896a4e84580a", "f907881206ce30b61820e8ba477d229cce6ec4a761a8db8c8c666f83eacf066f"}}}}}}, 0x0)
readv(r0, &(0x7f0000000a00)=[{&(0x7f0000000080)=""/8, 0x8}], 0x1)
17:45:23 executing program 0:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:23 executing program 1:
r0 = socket$inet6(0x10, 0x3, 0x0)
socket$inet6(0xa, 0x80003, 0x6c)
sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000002c49b22e9bd6f883430001c200000001", 0x1c, 0x0, 0x0, 0x0)
recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0)
recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="2656290000e4ffffff0fe289f39700008a1595cba8"], 0x0, 0x15}, 0x20)
bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "00000100000000000800000000eba71a4976e200002cb18f6e2e2aba000000012e0b3836005404b0e0301a6b3ee340b7679500800000000000000101013c5811039e15775027ecce8ef7792bbf0e66f5ff1b0816f3f6db1c000100000074e9ff00000000f0ffffffffffffff00"}, 0x80)
pipe(&(0x7f0000000040))
sendmsg$IPSET_CMD_GET_BYNAME(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffffffffffe4b, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[], 0x1}}, 0x0)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="900000002000", 0x6, 0x0, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="ffad000010", 0x5, 0x0, 0x0, 0x0)
r1 = socket$inet6(0x10, 0x3, 0x0)
sendto$inet6(r1, &(0x7f0000000000)='0', 0x10a73, 0x10, 0x0, 0x4b6ae4f95a5de35b)
[ 736.036525][T19740] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
17:45:23 executing program 0:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
[ 736.329464][T19740] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
[ 736.340130][T19747] netlink: 44304 bytes leftover after parsing attributes in process `syz-executor.1'.
[ 736.351539][T19743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
[ 736.364345][T19745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
[ 736.428386][T19743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
[ 736.438493][T19743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
[ 736.473075][T19740] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
[ 736.483776][T19745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
17:45:24 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
r2 = socket$kcm(0x11, 0x200000000000002, 0x300)
sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x173}, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={r2})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='.#-\x00')
r3 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:24 executing program 1:
r0 = eventfd(0x80008003)
r1 = gettid()
timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc))
r2 = fcntl$dupfd(r0, 0x0, r0)
r3 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x3)
fcntl$addseals(r3, 0x409, 0x6)
write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0'}, 0xb)
dup2(r3, r2)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
tkill(r1, 0x1000000000016)
17:45:24 executing program 5:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
recvmsg(r0, &(0x7f0000000600)={&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0, 0x0, 0x0, 0x1ef}, 0x0)
ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8901, &(0x7f0000000e40))
[ 736.963631][T19759] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 736.987381][T19759] team0: Device macvtap0 failed to register rx_handler
17:45:24 executing program 0:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:24 executing program 2:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff})
setsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0)
17:45:24 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff})
dup2(r1, r0)
ioctl$TIOCSSERIAL(r0, 0x541b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
17:45:24 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:25 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:25 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff})
close(r0)
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
fdatasync(r0)
17:45:25 executing program 1:
r0 = socket$inet(0x10, 0x80002, 0x0)
recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000008c0)=""/136, 0x88}, {&(0x7f0000000680)=""/225, 0xe1}, {&(0x7f00000017c0)=""/176, 0xb0}, {&(0x7f00000027c0)=""/4092, 0xffc}, {&(0x7f0000000480)=""/157, 0x9d}, {&(0x7f0000000540)=""/223, 0xdf}], 0x6}, 0x0)
sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)="4c0000001200ff09fffeb45a0fb883b7ff0100000000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63dbb5e89613b6aabf35d4c1cbc882b05", 0x4c}], 0x1}, 0x0)
recvmsg(r0, &(0x7f0000000780)={0xfffffffffffffffe, 0x0, 0x0}, 0x0)
17:45:25 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:25 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
r2 = socket$kcm(0x11, 0x200000000000002, 0x300)
sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x173}, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={r2})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='.#-\x00')
sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:25 executing program 5:
r0 = socket$inet6(0x10, 0x3, 0x0)
r1 = socket$inet6(0xa, 0x80003, 0x6c)
ioctl(r1, 0x1000008912, &(0x7f0000000080)="08418330e91000105ac071")
sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000002c49b22e9bd6f883430001c200000001", 0x1c, 0x0, 0x0, 0x0)
recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0)
recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="2656290000e4ffffff0fe289f39700008a1595cba8"], 0x0, 0x15}, 0x20)
bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "00000100000000000800000000eba71a4976e200002cb18f6e2e2aba000000012e0b3836005404b0e0301a6b3ee340b7679500800000000000000101013c5811039e15775027ecce8ef7792bbf0e66f5ff1b0816f3f6db1c000100000074e9ff00000000f0ffffffffffffff00"}, 0x80)
pipe(&(0x7f0000000040))
sendmsg$IPSET_CMD_GET_BYNAME(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffffffffffe4b, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[], 0x1}}, 0x0)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="900000002000", 0x6, 0x0, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="ffad000010", 0x5, 0x0, 0x0, 0x0)
r2 = socket$inet6(0x10, 0x3, 0x0)
sendto$inet6(r2, &(0x7f0000000000)='0', 0x10a73, 0x10, 0x0, 0x4b6ae4f95a5de35b)
17:45:25 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 738.431184][T19795] netlink: 'syz-executor.1': attribute type 29 has an invalid length.
[ 738.440374][T19795] netlink: 'syz-executor.1': attribute type 29 has an invalid length.
[ 738.451925][T19793] netlink: 'syz-executor.1': attribute type 29 has an invalid length.
[ 738.486880][T19796] netlink: 'syz-executor.1': attribute type 29 has an invalid length.
17:45:26 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:26 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
[ 738.630431][T19795] netlink: 'syz-executor.1': attribute type 29 has an invalid length.
[ 738.639594][T19795] netlink: 'syz-executor.1': attribute type 29 has an invalid length.
[ 738.653033][T19793] netlink: 'syz-executor.1': attribute type 29 has an invalid length.
17:45:26 executing program 1:
pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
write(0xffffffffffffffff, &(0x7f0000000140)="fc0000001c00070cab0925000900f00007ab08000800000003000000210001c000000000000000000c00000000039815fa2c1ec28656aaa79bb94b46fe0000000a0002", 0x43)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000080)="08418324e91000105ac071")
writev(0xffffffffffffffff, 0x0, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a61c)
r3 = socket(0x10, 0x80002, 0x0)
splice(r0, 0x0, r3, 0x0, 0x10005, 0x0)
[ 738.852443][T19801] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 738.927246][T19806] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
17:45:26 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
r2 = socket$kcm(0x11, 0x200000000000002, 0x300)
sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x173}, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={r2})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='.#-\x00')
sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
[ 739.072871][ C0] not chained 160000 origins
[ 739.077517][ C0] CPU: 0 PID: 624 Comm: kworker/u4:24 Not tainted 5.6.0-rc7-syzkaller #0
[ 739.085928][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 739.095994][ C0] Workqueue: krdsd rds_tcp_accept_worker
[ 739.101807][ C0] Call Trace:
[ 739.105086][ C0]
[ 739.107951][ C0] dump_stack+0x1c9/0x220
[ 739.112276][ C0] ? tcp_v4_do_rcv+0xb0f/0xd70
[ 739.117044][ C0] kmsan_internal_chain_origin+0x6f/0x130
[ 739.122756][ C0] ? ip_finish_output2+0x2115/0x2610
[ 739.128034][ C0] ? __ip_finish_output+0xaa7/0xd80
[ 739.133218][ C0] ? ip_finish_output+0x166/0x410
[ 739.138229][ C0] ? ip_output+0x593/0x680
[ 739.142635][ C0] ? __ip_queue_xmit+0x1b5c/0x21a0
[ 739.147732][ C0] ? ip_queue_xmit+0xcc/0xf0
[ 739.152308][ C0] ? __tcp_transmit_skb+0x439c/0x6090
[ 739.157670][ C0] ? tcp_write_xmit+0x30e1/0xb470
[ 739.162682][ C0] ? __tcp_push_pending_frames+0x124/0x4e0
[ 739.168480][ C0] ? tcp_send_fin+0x131e/0x1570
[ 739.173330][ C0] ? tcp_shutdown+0x188/0x200
[ 739.177993][ C0] ? inet_shutdown+0x342/0x5e0
[ 739.182742][ C0] ? kernel_sock_shutdown+0x9d/0xc0
[ 739.187941][ C0] ? rds_tcp_accept_one+0xe17/0x1060
[ 739.193216][ C0] ? rds_tcp_accept_worker+0x61/0x160
[ 739.198662][ C0] ? process_one_work+0x1555/0x1f40
[ 739.203845][ C0] ? worker_thread+0xef6/0x2450
[ 739.208693][ C0] ? kthread+0x4b5/0x4f0
[ 739.212922][ C0] ? ret_from_fork+0x35/0x40
[ 739.217506][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 739.222691][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 739.228506][ C0] ? __msan_metadata_ptr_for_load_4+0x10/0x20
[ 739.234570][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 739.239769][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 739.245599][ C0] ? __msan_metadata_ptr_for_store_4+0x13/0x20
[ 739.251751][ C0] ? __msan_get_context_state+0x9/0x20
[ 739.257387][ C0] ? __module_get+0x19/0x230
[ 739.261982][ C0] ? inet_twsk_alloc+0x7bb/0xba0
[ 739.266916][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 739.272108][ C0] __msan_chain_origin+0x50/0x90
[ 739.277040][ C0] tcp_time_wait+0xb7e/0x10b0
[ 739.281718][ C0] tcp_fin+0x1f9/0x890
[ 739.285781][ C0] tcp_data_queue+0x24ce/0x9c40
[ 739.290716][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 739.296524][ C0] ? __msan_metadata_ptr_for_load_2+0x10/0x20
[ 739.302598][ C0] tcp_rcv_state_process+0x5ba3/0x71c0
[ 739.308052][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 739.313873][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 739.319068][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 739.323657][ C0] tcp_v4_rcv+0x4398/0x4d00
[ 739.328195][ C0] ? tcp_filter+0xf0/0xf0
[ 739.332773][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 739.338230][ C0] ip_local_deliver+0x62a/0x7c0
[ 739.343078][ C0] ? ip_local_deliver+0x7c0/0x7c0
[ 739.348093][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0
[ 739.353713][ C0] ip_rcv+0x6cf/0x750
[ 739.357696][ C0] ? ip_rcv_core+0x1270/0x1270
[ 739.363406][ C0] ? ip_local_deliver_finish+0x350/0x350
[ 739.369029][ C0] process_backlog+0xf0b/0x1410
[ 739.373876][ C0] ? ip_local_deliver_finish+0x350/0x350
[ 739.379509][ C0] ? rps_trigger_softirq+0x2e0/0x2e0
[ 739.384782][ C0] net_rx_action+0x786/0x1aa0
[ 739.389475][ C0] ? net_tx_action+0xc30/0xc30
[ 739.394230][ C0] __do_softirq+0x311/0x83d
[ 739.398736][ C0] do_softirq_own_stack+0x49/0x80
[ 739.403744][ C0]
[ 739.406700][ C0] __local_bh_enable_ip+0x184/0x1d0
[ 739.411892][ C0] local_bh_enable+0x36/0x40
[ 739.416472][ C0] ip_finish_output2+0x2115/0x2610
[ 739.421579][ C0] ? ctnetlink_net_exit_batch+0x180/0x180
[ 739.427293][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0
[ 739.433317][ C0] __ip_finish_output+0xaa7/0xd80
[ 739.438354][ C0] ip_finish_output+0x166/0x410
[ 739.443206][ C0] ip_output+0x593/0x680
[ 739.447496][ C0] ? ip_mc_finish_output+0x6c0/0x6c0
[ 739.452792][ C0] ? ip_finish_output+0x410/0x410
[ 739.457816][ C0] __ip_queue_xmit+0x1b5c/0x21a0
[ 739.462753][ C0] ? kmsan_set_origin_checked+0x95/0xf0
[ 739.468292][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 739.473497][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 739.478692][ C0] ip_queue_xmit+0xcc/0xf0
[ 739.483104][ C0] ? tcp_v6_send_response+0x2920/0x2920
[ 739.488643][ C0] __tcp_transmit_skb+0x439c/0x6090
[ 739.493868][ C0] tcp_write_xmit+0x30e1/0xb470
[ 739.498776][ C0] __tcp_push_pending_frames+0x124/0x4e0
[ 739.504404][ C0] tcp_send_fin+0x131e/0x1570
[ 739.509102][ C0] tcp_shutdown+0x188/0x200
[ 739.513608][ C0] ? tcp_set_state+0x9d0/0x9d0
[ 739.518361][ C0] inet_shutdown+0x342/0x5e0
[ 739.522956][ C0] ? inet_recvmsg+0x7d0/0x7d0
[ 739.527632][ C0] kernel_sock_shutdown+0x9d/0xc0
[ 739.532663][ C0] rds_tcp_accept_one+0xe17/0x1060
[ 739.537761][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 739.542962][ C0] rds_tcp_accept_worker+0x61/0x160
[ 739.548162][ C0] ? rds_tcp_exit_net+0xcb0/0xcb0
[ 739.553176][ C0] process_one_work+0x1555/0x1f40
[ 739.558210][ C0] worker_thread+0xef6/0x2450
[ 739.562904][ C0] kthread+0x4b5/0x4f0
[ 739.566960][ C0] ? process_one_work+0x1f40/0x1f40
[ 739.572155][ C0] ? kthread_blkcg+0xf0/0xf0
[ 739.576734][ C0] ret_from_fork+0x35/0x40
[ 739.581148][ C0] Uninit was stored to memory at:
[ 739.586163][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 739.591868][ C0] __msan_chain_origin+0x50/0x90
[ 739.596808][ C0] inet_twsk_alloc+0xab6/0xba0
[ 739.601558][ C0] tcp_time_wait+0xcd/0x10b0
[ 739.606132][ C0] tcp_fin+0x1f9/0x890
[ 739.610184][ C0] tcp_data_queue+0x24ce/0x9c40
[ 739.615023][ C0] tcp_rcv_state_process+0x5ba3/0x71c0
[ 739.620490][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 739.625085][ C0] tcp_v4_rcv+0x4398/0x4d00
[ 739.629580][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 739.635047][ C0] ip_local_deliver+0x62a/0x7c0
[ 739.639892][ C0] ip_rcv+0x6cf/0x750
[ 739.643867][ C0] process_backlog+0xf0b/0x1410
[ 739.648724][ C0] net_rx_action+0x786/0x1aa0
[ 739.653389][ C0] __do_softirq+0x311/0x83d
[ 739.657936][ C0]
[ 739.660265][ C0] Uninit was stored to memory at:
[ 739.665302][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 739.671012][ C0] __msan_chain_origin+0x50/0x90
[ 739.675939][ C0] __inet_twsk_schedule+0x24e/0x2c0
[ 739.681142][ C0] tcp_time_wait+0xaca/0x10b0
[ 739.685802][ C0] tcp_fin+0x1f9/0x890
[ 739.689857][ C0] tcp_data_queue+0x24ce/0x9c40
[ 739.694691][ C0] tcp_rcv_state_process+0x5ba3/0x71c0
[ 739.700137][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 739.704714][ C0] tcp_v4_rcv+0x4398/0x4d00
[ 739.709208][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 739.714659][ C0] ip_local_deliver+0x62a/0x7c0
[ 739.719494][ C0] ip_rcv+0x6cf/0x750
[ 739.723464][ C0] process_backlog+0xf0b/0x1410
[ 739.728302][ C0] net_rx_action+0x786/0x1aa0
[ 739.732965][ C0] __do_softirq+0x311/0x83d
[ 739.737443][ C0]
[ 739.739757][ C0] Uninit was stored to memory at:
[ 739.744768][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 739.750483][ C0] __msan_chain_origin+0x50/0x90
[ 739.755429][ C0] tcp_time_wait+0xb7e/0x10b0
[ 739.760106][ C0] tcp_fin+0x1f9/0x890
[ 739.764254][ C0] tcp_data_queue+0x24ce/0x9c40
[ 739.769095][ C0] tcp_rcv_state_process+0x5ba3/0x71c0
[ 739.774558][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 739.779160][ C0] tcp_v4_rcv+0x4398/0x4d00
[ 739.783666][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 739.789114][ C0] ip_local_deliver+0x62a/0x7c0
[ 739.793970][ C0] ip_rcv+0x6cf/0x750
[ 739.797960][ C0] process_backlog+0xf0b/0x1410
[ 739.802805][ C0] net_rx_action+0x786/0x1aa0
[ 739.807472][ C0] __do_softirq+0x311/0x83d
[ 739.811951][ C0]
[ 739.814265][ C0] Uninit was stored to memory at:
[ 739.819278][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 739.824981][ C0] __msan_chain_origin+0x50/0x90
[ 739.829907][ C0] inet_twsk_alloc+0xab6/0xba0
[ 739.834660][ C0] tcp_time_wait+0xcd/0x10b0
[ 739.839235][ C0] tcp_fin+0x1f9/0x890
[ 739.843287][ C0] tcp_data_queue+0x24ce/0x9c40
[ 739.848122][ C0] tcp_rcv_state_process+0x5ba3/0x71c0
[ 739.853565][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 739.858140][ C0] tcp_v4_rcv+0x4398/0x4d00
[ 739.862639][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 739.868101][ C0] ip_local_deliver+0x62a/0x7c0
[ 739.872941][ C0] ip_rcv+0x6cf/0x750
[ 739.876918][ C0] process_backlog+0xf0b/0x1410
[ 739.881771][ C0] net_rx_action+0x786/0x1aa0
[ 739.886443][ C0] __do_softirq+0x311/0x83d
[ 739.890929][ C0]
[ 739.893245][ C0] Uninit was stored to memory at:
[ 739.898274][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 739.903990][ C0] __msan_chain_origin+0x50/0x90
[ 739.908925][ C0] __inet_twsk_schedule+0x24e/0x2c0
[ 739.914121][ C0] tcp_time_wait+0xaca/0x10b0
[ 739.918781][ C0] tcp_fin+0x1f9/0x890
[ 739.922837][ C0] tcp_data_queue+0x24ce/0x9c40
[ 739.927802][ C0] tcp_rcv_state_process+0x5ba3/0x71c0
[ 739.933266][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 739.937853][ C0] tcp_v4_rcv+0x4398/0x4d00
[ 739.942349][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 739.947809][ C0] ip_local_deliver+0x62a/0x7c0
[ 739.952660][ C0] ip_rcv+0x6cf/0x750
[ 739.956636][ C0] process_backlog+0xf0b/0x1410
[ 739.961487][ C0] net_rx_action+0x786/0x1aa0
[ 739.966151][ C0] __do_softirq+0x311/0x83d
[ 739.970643][ C0]
[ 739.972956][ C0] Uninit was stored to memory at:
[ 739.977966][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 739.983681][ C0] __msan_chain_origin+0x50/0x90
[ 739.988614][ C0] tcp_time_wait+0xb7e/0x10b0
[ 739.993272][ C0] tcp_fin+0x1f9/0x890
[ 739.997331][ C0] tcp_data_queue+0x24ce/0x9c40
[ 740.002165][ C0] tcp_rcv_state_process+0x5ba3/0x71c0
[ 740.007720][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 740.012313][ C0] tcp_v4_rcv+0x4398/0x4d00
[ 740.016815][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 740.022279][ C0] ip_local_deliver+0x62a/0x7c0
[ 740.027123][ C0] ip_rcv+0x6cf/0x750
[ 740.031098][ C0] process_backlog+0xf0b/0x1410
[ 740.035941][ C0] net_rx_action+0x786/0x1aa0
[ 740.040630][ C0] __do_softirq+0x311/0x83d
[ 740.045139][ C0]
[ 740.047458][ C0] Uninit was stored to memory at:
[ 740.052477][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 740.058203][ C0] __msan_chain_origin+0x50/0x90
[ 740.063154][ C0] inet_twsk_alloc+0xab6/0xba0
[ 740.067918][ C0] tcp_time_wait+0xcd/0x10b0
[ 740.072497][ C0] tcp_fin+0x1f9/0x890
[ 740.076564][ C0] tcp_data_queue+0x24ce/0x9c40
[ 740.081415][ C0] tcp_rcv_state_process+0x5ba3/0x71c0
[ 740.086871][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 740.091447][ C0] tcp_v4_rcv+0x4398/0x4d00
[ 740.095936][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 740.101376][ C0] ip_local_deliver+0x62a/0x7c0
[ 740.106209][ C0] ip_rcv+0x6cf/0x750
[ 740.110183][ C0] process_backlog+0xf0b/0x1410
[ 740.115017][ C0] net_rx_action+0x786/0x1aa0
[ 740.119683][ C0] __do_softirq+0x311/0x83d
[ 740.124163][ C0]
[ 740.126475][ C0] Uninit was created at:
[ 740.130703][ C0] kmsan_save_stack_with_flags+0x3c/0x90
[ 740.136318][ C0] kmsan_alloc_page+0x12a/0x310
[ 740.141153][ C0] __alloc_pages_nodemask+0x5712/0x5e80
[ 740.146685][ C0] alloc_pages_current+0x67d/0x990
[ 740.151793][ C0] alloc_slab_page+0x111/0x12f0
[ 740.156639][ C0] new_slab+0x2bc/0x1130
[ 740.160871][ C0] ___slab_alloc+0x14a3/0x2040
[ 740.165920][ C0] kmem_cache_alloc+0xb23/0xd70
[ 740.170769][ C0] inet_twsk_alloc+0x135/0xba0
[ 740.175526][ C0] tcp_time_wait+0xcd/0x10b0
[ 740.180103][ C0] tcp_fin+0x1f9/0x890
[ 740.184172][ C0] tcp_data_queue+0x24ce/0x9c40
[ 740.189009][ C0] tcp_rcv_state_process+0x5ba3/0x71c0
[ 740.194454][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 740.199027][ C0] tcp_v4_rcv+0x4398/0x4d00
[ 740.203515][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 740.208959][ C0] ip_local_deliver+0x62a/0x7c0
[ 740.213793][ C0] ip_rcv+0x6cf/0x750
[ 740.217762][ C0] process_backlog+0xf0b/0x1410
[ 740.222602][ C0] net_rx_action+0x786/0x1aa0
[ 740.227269][ C0] __do_softirq+0x311/0x83d
[ 740.371296][T19814] selinux_netlink_send: 35 callbacks suppressed
[ 740.371352][T19814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19814 comm=syz-executor.4
17:45:27 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 740.450147][T19816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19816 comm=syz-executor.1
17:45:27 executing program 5:
open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0)
statfs(&(0x7f0000000100)='./bus\x00', &(0x7f0000000880)=""/4096)
17:45:28 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
[ 740.552058][T19816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19816 comm=syz-executor.1
[ 740.580060][T19814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19814 comm=syz-executor.4
[ 740.670047][T19816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19816 comm=syz-executor.1
[ 740.695243][T19814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19814 comm=syz-executor.4
[ 740.755067][T19816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19816 comm=syz-executor.1
[ 740.776066][T19814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19814 comm=syz-executor.4
[ 740.876608][T19816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19816 comm=syz-executor.1
[ 740.889777][T19814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19814 comm=syz-executor.4
17:45:28 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:28 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:28 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:28 executing program 5:
r0 = open(&(0x7f00000000c0)='./file1\x00', 0x161042, 0x0)
r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0)
r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendfile(r0, r1, 0x0, 0x283)
17:45:28 executing program 1:
recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
shmget$private(0x0, 0x2000, 0x100, &(0x7f0000ffb000/0x2000)=nil)
shmctl$IPC_RMID(0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, &(0x7f0000000100))
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040))
setuid(0x0)
ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000380)={0x4d, "ea3d3f8202b543e5842ef8057901ba6aeae738bcc983bc34dd74490c71aab6d2685b06b3cfccc2ee54d8bb801bac8ec08c8aa805c70018136b0ff29de4431b51225810b7ed0eeb09045991c2a3"})
17:45:28 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:28 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:29 executing program 5:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
ioctl(r0, 0x5450, 0x0)
17:45:30 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
r2 = socket$kcm(0x11, 0x200000000000002, 0x300)
sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x173}, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={r2})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='.#-\x00')
sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:30 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:30 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:30 executing program 5:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
sendto(r0, &(0x7f0000000040)="cc19101c48fb650cbaf2c9e5ee7d91026e2415e159d4d0ad1dcd1c1e48e32ee6fc02871f83cd763694cf43088aea126101a34270e4958397b3d98cc53a4c241af2e19f8959cfc8d2b75ca236d01a20f3c90313b3787bb83055f9328214792a5a3e775f4598067dc2284097642c8ec457353c6bbfacde0bf102dfc56ba3bfbfc4255980bd2bafd92b1f31ee3ace15586bd98bd1cdb76b1b161138c4e9923f2b6846897296ef2364efca685c30faf95da8c79e582f5abd51fad8977e656e4066b9de4aadb5f310352534951b2384370a9b1d3b0ebee6bf806d163d618eff1622589c5b", 0x57e14d2dec7c0eb6, 0x40, 0x0, 0x0)
sendto(r0, &(0x7f0000000300)="ac", 0x1, 0x240040c0, 0x0, 0x0)
17:45:30 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:30 executing program 1:
r0 = eventfd(0x0)
writev(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)="979266dedc556be6", 0x8}], 0x1)
r1 = gettid()
timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc))
r2 = fcntl$dupfd(r0, 0x0, r0)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
write$P9_RATTACH(r2, &(0x7f0000000080)={0x14, 0x69, 0x0, {0x40}}, 0x14)
close(r2)
openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40182, 0x0)
tkill(r1, 0x1000000000016)
17:45:30 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:30 executing program 5:
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c)
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00')
preadv(r0, &(0x7f0000000700), 0x31f, 0xa000000)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
17:45:30 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:30 executing program 1:
r0 = socket(0x11, 0x800000003, 0x0)
bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14)
ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@mcast1, 0x0, r1})
r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3)
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b04, &(0x7f0000000000)='wlan0\x00')
17:45:30 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
r2 = socket$kcm(0x11, 0x200000000000002, 0x300)
sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x173}, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={r2})
r3 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:31 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000100)={0x9, 0x89}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff})
fcntl$setpipe(r2, 0x407, 0x0)
write(r2, &(0x7f0000000340), 0x41395527)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r3 = gettid()
process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x35c}], 0x329, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x299, 0x0)
17:45:31 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:31 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
[ 743.796273][T19892] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 743.814474][T19892] team0: Device macvtap0 failed to register rx_handler
17:45:31 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:31 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f00000001c0)=[{0x84}, {0x6, 0x0, 0x0, 0xfffffffd}]})
socket$nl_xfrm(0x10, 0x3, 0x6)
17:45:31 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:32 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:32 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:32 executing program 5:
pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff})
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0)
r2 = syz_genetlink_get_family_id$nl80211(0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0)
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0)
sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8002000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, r2, 0x0, 0x0, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x6, 0xbe, "20ad"}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xc}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}]}, 0x2c}}, 0x4044)
socket(0x0, 0x2, 0x0)
read$FUSE(r0, &(0x7f0000000500), 0x20001500)
17:45:32 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
socket$kcm(0x11, 0x200000000000002, 0x300)
sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x173}, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:32 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:32 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:32 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff})
r1 = socket$inet6(0xa, 0x3, 0x3c)
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f00000001c0)=[{0x84}, {0x6, 0x0, 0x0, 0xfffffffd}]})
socket$nl_xfrm(0x10, 0x3, 0x6)
17:45:32 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
[ 745.523389][T19925] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 745.543456][T19925] team0: Device macvtap0 failed to register rx_handler
[ 745.753626][ T33] audit: type=1326 audit(1586972733.173:20): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f65d99 code=0xffff0000
17:45:33 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:33 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:33 executing program 5:
pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff})
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
read$FUSE(r0, &(0x7f0000000500), 0x20001500)
[ 746.336106][T19935] selinux_netlink_send: 65 callbacks suppressed
[ 746.336154][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.4
17:45:33 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
socket$kcm(0x11, 0x200000000000002, 0x300)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
[ 746.504526][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.4
[ 746.525985][ T33] audit: type=1326 audit(1586972733.943:21): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f65d99 code=0xffff0000
17:45:34 executing program 1:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='sched\x00')
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0)
sendfile(r1, r0, 0x0, 0x20000000000000d8)
dup(0xffffffffffffffff)
semctl$GETALL(0x0, 0x0, 0xd, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, 0x0, 0x20, 0x0, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x2050830}, 0x404408c)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40180, 0x152)
name_to_handle_at(r2, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)={0xdc, 0x6ef3, "2d95e0d47b717c208de249fa672aa7647f5d9666835c9d95d1935841e2e995e3d0717eaea92b82365885c7cf08aaaa3b67956a1cebf82f426c0ec2cb9a5470fa8994d4f81e109828a58a9697635a0aca718943f2ce945cd28b370ea748f2f40d894cea3e4e3c4424ff44846f8414de2b4129281e69d073d27364edf58c246c3cfee566cc4f04184c1f9a8ec124d87c1c67a6d39e591bb2e7e64dc5529c4fcdbd50d4baed7a5e4806ca69f8dec230306a82163575933876a5a8db248f6c32d05d9dfc811efbc75cbd076ef84240b734acf628ffe7"}, &(0x7f0000000300), 0x0)
[ 746.661326][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.4
17:45:34 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:34 executing program 2:
connect$inet6(0xffffffffffffffff, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 746.781504][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.4
[ 746.894747][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.4
[ 746.998535][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.4
[ 747.009192][T19956] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 747.030770][T19956] team0: Device macvtap0 failed to register rx_handler
[ 747.051297][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.4
[ 747.184702][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.4
17:45:34 executing program 2:
connect$inet6(0xffffffffffffffff, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 747.302438][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.4
[ 747.349069][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.4
17:45:35 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:35 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:35 executing program 1:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='sched\x00')
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0)
sendfile(r1, r0, 0x0, 0x20000000000000d8)
dup(0xffffffffffffffff)
semctl$GETALL(0x0, 0x0, 0xd, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, 0x0, 0x20, 0x0, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x2050830}, 0x404408c)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40180, 0x152)
name_to_handle_at(r2, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)={0xdc, 0x6ef3, "2d95e0d47b717c208de249fa672aa7647f5d9666835c9d95d1935841e2e995e3d0717eaea92b82365885c7cf08aaaa3b67956a1cebf82f426c0ec2cb9a5470fa8994d4f81e109828a58a9697635a0aca718943f2ce945cd28b370ea748f2f40d894cea3e4e3c4424ff44846f8414de2b4129281e69d073d27364edf58c246c3cfee566cc4f04184c1f9a8ec124d87c1c67a6d39e591bb2e7e64dc5529c4fcdbd50d4baed7a5e4806ca69f8dec230306a82163575933876a5a8db248f6c32d05d9dfc811efbc75cbd076ef84240b734acf628ffe7"}, &(0x7f0000000300), 0x0)
17:45:35 executing program 5:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$nl80211(0x0)
sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100), 0xc, 0x0}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup(r1)
getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@dev, @multicast1, r3}, 0xc)
17:45:35 executing program 2:
connect$inet6(0xffffffffffffffff, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:35 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:35 executing program 1:
unshare(0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=""/65, 0x41}}], 0x1, 0x10000, 0x0)
pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000700)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x9}, 0x0)
creat(0x0, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x28)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140))
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r4 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r4, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c)
sendmmsg(r4, &(0x7f0000007e00), 0x136a88c8311572c, 0x11)
17:45:35 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:35 executing program 2:
r0 = socket$inet6(0xa, 0x0, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:35 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000))
ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000240))
[ 748.684179][T19994] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 748.702220][T19994] team0: Device macvtap0 failed to register rx_handler
17:45:36 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:36 executing program 1:
unshare(0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000340)=""/242, 0xf2}, {&(0x7f0000000440)=""/190, 0xbe}, {0x0}, {&(0x7f0000000540)=""/102, 0x66}, {&(0x7f0000000980)=""/207, 0xcf}], 0x5, &(0x7f0000000800)=""/65, 0x41}}], 0x1, 0x10000, 0x0)
pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000700)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x9}, 0x0)
creat(0x0, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140))
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r4 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r4, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c)
sendmmsg(r4, &(0x7f0000007e00), 0x136a88c8311572c, 0x11)
17:45:36 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:36 executing program 2:
r0 = socket$inet6(0xa, 0x0, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:36 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$key(0xf, 0x3, 0x2)
recvmmsg(r0, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400})
sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/405], 0x10}}, 0x0)
17:45:36 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:37 executing program 1:
clock_getres(0x47d79d4ef2bc9f46, 0x0)
writev(0xffffffffffffffff, 0x0, 0x31)
openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0)
17:45:37 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db95f5b068a9e00"/250], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:37 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000)
ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, 0x0)
r1 = socket$key(0xf, 0x3, 0x2)
recvmmsg(r1, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400})
socket$bt_hidp(0x1f, 0x3, 0x6)
fcntl$dupfd(0xffffffffffffffff, 0x406, r1)
sendmsg$key(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"/403], 0x10}}, 0x0)
17:45:37 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086604, &(0x7f0000000080))
ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000200))
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:37 executing program 2:
r0 = socket$inet6(0xa, 0x0, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:37 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db95f5b068a9e00"/250], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:37 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0], 0x4}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
[ 750.545802][T20048] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 750.568771][T20048] team0: Device macvtap0 failed to register rx_handler
17:45:38 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$key(0xf, 0x3, 0x2)
recvmmsg(r0, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400})
sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="020500000200000000000000000000006622e85f3d08e1fb8abc9e557817db65bc28dce194bb4cabd6f87a264c66c0c37eaa34214c0b92fbb0401107900b4e1e0e2d2730aa821047cafaa2000000000000002000d70533a731660000000000000009000100000000000000a869d9545702f1ad41feefc38fe44bba9966579d327e3e703ef43bd7e5827304d369ad976174948e0e68db66849a351dc896745be2733383ed15dacdedac39b1aad882951850c0edf298bb8fc6d2c12be024702ecc70f18c8849df0bbffbd515cb2d548ad977208689a326aedd12c9b7f16553d8b9dfc165b6d6ede53acea8d69b14b26eca731b762cc664b79a5a91b1a3a6b718040000000000000025a6187ce208ab67f6ae02c8fe57ab00040000000000000000000000000081dbd4753692502963014cef84021e7bb2a316689464c74cbb04be265b07c3e37d7c67a040aa960ab7878e5d1823b71689e725e15eff3595b2bf154eade92d2e2fbe449f6d3c6aa89c145b70f14de9580ac25060528d3636fe6990dc5512d37c092500"/405], 0x10}}, 0x0)
17:45:38 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x0)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:38 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db95f5b068a9e00"/250], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:39 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{}, {0x0, @local}, 0x4a})
17:45:39 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
[ 751.856289][T20060] selinux_netlink_send: 35 callbacks suppressed
[ 751.856338][T20060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20060 comm=syz-executor.4
[ 752.016673][T20060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20060 comm=syz-executor.4
17:45:39 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x0)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:39 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086604, &(0x7f0000000080))
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
[ 752.143190][T20060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20060 comm=syz-executor.4
17:45:39 executing program 5:
r0 = socket(0x11, 0x800000003, 0x0)
bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14)
ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@mcast1, 0x0, r1})
r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b04, &(0x7f0000000000)='wlan0\x00')
[ 752.275677][T20060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20060 comm=syz-executor.4
17:45:39 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
[ 752.357448][T20060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20060 comm=syz-executor.4
17:45:39 executing program 1:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3)
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b04, &(0x7f0000000000)='wlan0\x00')
[ 752.478835][T20060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20060 comm=syz-executor.4
[ 752.534967][T20087] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 752.552993][T20087] team0: Device macvtap0 failed to register rx_handler
[ 752.614391][T20060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20060 comm=syz-executor.4
[ 752.767037][T20060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20060 comm=syz-executor.4
17:45:40 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x0)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 752.893435][T20060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20060 comm=syz-executor.4
[ 752.986884][T20060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20060 comm=syz-executor.4
17:45:40 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0], 0x4}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:40 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00')
preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000140)=""/191, 0xbf}], 0x1, 0xffffffd)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0)
writev(0xffffffffffffffff, &(0x7f0000000000), 0x0)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000001600)='/dev/ptmx\x00', 0x0, 0x0)
17:45:40 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:40 executing program 1:
mkdir(&(0x7f0000000400)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0])
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
umount2(&(0x7f0000000000)='./file0\x00', 0xb)
17:45:41 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:41 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:41 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:41 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(0xffffffffffffffff, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:41 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000)
ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, 0x0)
r1 = socket$key(0xf, 0x3, 0x2)
recvmmsg(r1, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400})
r2 = socket$bt_hidp(0x1f, 0x3, 0x6)
fcntl$dupfd(r2, 0x406, r1)
sendmsg$key(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020500000200000000000000000000006622e85f3d08e1fb8abc9e557817db65bc28dce194bb4cabd6f87a264c66c0c37eaa34214c0b92fbb0401107900b4e1e0e2d2730aa821047cafaa2000000000000002000d70533a731660000000000000009000100000000000000a869d9545702f1ad41feefc38fe44bba9966579d327e3e703ef43bd7e5827304d369ad976174948e0e68db66849a351dc896745be2733383ed15dacdedac39b1aad882951850c0edf298bb8fc6d2c12be024702ecc70f18c8849df0bbffbd515cb2d548ad977208689a326aedd12c9b7f16553d8b9dfc165b6d6ede53acea8d69b14b26eca731b762cc664b79a5a91b1a3a6b718040000000000000025a6187ce208ab67f6ae02c8fe57ab00040000000000000000000000000081dbd4753692502963014cef84021e7bb2a316687c67a040aa960ab7878e5d1823b71689e725e15eff3595b2bf154eade92d2e2fbe449f6d3c6aa89c145b70f14de9580ac25060528d3636fe6990dc551286d262c133d18539719f4bd37c092500"/403], 0x10}}, 0x0)
[ 754.035982][T20125] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 754.056405][T20125] team0: Device macvtap0 failed to register rx_handler
[ 754.130020][T20128] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20128]
[ 754.176312][T20130] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20130]
17:45:41 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:41 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:42 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0], 0x4}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:42 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(0xffffffffffffffff, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 754.784530][T20139] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20139]
[ 754.879463][T20141] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20141]
17:45:42 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = memfd_create(&(0x7f0000000340), 0x0)
ftruncate(r0, 0x800799c)
mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
17:45:42 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:42 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000)
ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, 0x0)
r1 = socket$key(0xf, 0x3, 0x2)
recvmmsg(r1, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400})
r2 = socket$bt_hidp(0x1f, 0x3, 0x6)
fcntl$dupfd(r2, 0x406, r1)
sendmsg$key(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"/403], 0x10}}, 0x0)
17:45:42 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xff, 0x658}, 0x200, 0x0, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:42 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(0xffffffffffffffff, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 755.941040][T20161] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 755.967637][T20161] team0: Device macvtap0 failed to register rx_handler
17:45:43 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:43 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:43 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, 0x0, 0x0)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:44 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807c0ee93ea1bb7f00a15deb269d0a91985602763e4d70d404da"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:44 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000)
ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, 0x0)
r1 = socket$key(0xf, 0x3, 0x2)
recvmmsg(r1, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400})
r2 = socket$bt_hidp(0x1f, 0x3, 0x6)
fcntl$dupfd(r2, 0x406, r1)
sendmsg$key(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"/403], 0x10}}, 0x0)
17:45:44 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, 0x0, 0x0)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 757.238233][T20169] selinux_netlink_send: 35 callbacks suppressed
[ 757.238282][T20169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20169 comm=syz-executor.4
[ 757.385569][T20169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20169 comm=syz-executor.4
17:45:44 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
[ 757.541029][T20169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20169 comm=syz-executor.4
[ 757.708849][T20169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20169 comm=syz-executor.4
[ 757.829727][T20169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20169 comm=syz-executor.4
[ 757.968324][T20169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20169 comm=syz-executor.4
[ 758.102148][T20169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20169 comm=syz-executor.4
[ 758.163253][T20169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20169 comm=syz-executor.4
[ 758.216154][T20169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20169 comm=syz-executor.4
[ 758.331161][T20169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20169 comm=syz-executor.4
17:45:46 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, 0x0, 0x0)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:46 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:46 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:46 executing program 5:
perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x80002, 0x0)
r1 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0})
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="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"/587], 0x74}}, 0x0)
sendmmsg$alg(r0, &(0x7f0000000180)=[{0x10, 0x1000000000000, &(0x7f0000000080), 0xd, &(0x7f0000000100)}], 0x492492492492642, 0x0)
17:45:46 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:46 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba000000000000000000400000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000dc362cd0aea76b3fcba7a5b402d230683d5dcdabf52a439d09ce37957b868e0f6cba2fb475ec8807d3f60300ff1b318eb374016b38dd079a38cadbbe06cfe188ac46f64fa20de6073fbd9b6b8af0511e2e"], 0x28}}, 0x0)
perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'ipvlan1\x00'})
[ 759.137816][T20193] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[ 759.145811][T20193] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
17:45:46 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:46 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
[ 759.485397][T20193] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check.
[ 759.513819][T20195] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 759.531116][T20195] team0: Device macvtap0 failed to register rx_handler
17:45:47 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:47 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807c0ee93ea1bb7f00a15deb269d0a91985602763e4d70d404da006a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:47 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:47 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:47 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:47 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 760.325547][T20193] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[ 760.433375][T20193] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check.
17:45:48 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:48 executing program 3:
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:48 executing program 1:
socket$inet6_tcp(0xa, 0x1, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe}, 0x0)
socket$inet6(0xa, 0x2, 0x0)
pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(r2, &(0x7f0000000340), 0x41395527)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000700)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x9}, 0x0)
creat(0x0, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140))
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r3, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c)
sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x11)
17:45:48 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:48 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
[ 760.905357][T20235] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 760.916573][T20235] team0: Device macvtap0 failed to register rx_handler
17:45:48 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:48 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807c0ee93ea1bb7f00a15deb269d0a91985602763e4d70d404da006a3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:48 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:48 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:48 executing program 1:
recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
shmget$private(0x0, 0x2000, 0x100, &(0x7f0000ffb000/0x2000)=nil)
shmctl$IPC_RMID(0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, &(0x7f0000000100)={0xfffffffd})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
setuid(0x0)
ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, 0x0)
17:45:49 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:49 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:49 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:49 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
process_vm_readv(0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:49 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 762.263817][T20273] selinux_netlink_send: 35 callbacks suppressed
[ 762.263866][T20273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20273 comm=syz-executor.4
[ 762.274528][T20272] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 762.295290][T20272] team0: Device macvtap0 failed to register rx_handler
17:45:49 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:49 executing program 1:
recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
shmget$private(0x0, 0x2000, 0x100, &(0x7f0000ffb000/0x2000)=nil)
shmctl$IPC_RMID(0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, &(0x7f0000000100)={0xfffffffd})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
setuid(0x0)
ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, 0x0)
[ 762.360638][T20273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20273 comm=syz-executor.4
[ 762.474143][T20273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20273 comm=syz-executor.4
[ 762.552018][T20273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20273 comm=syz-executor.4
17:45:50 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
process_vm_readv(0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:50 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, 0x0, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 762.669791][T20273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20273 comm=syz-executor.4
[ 762.828246][T20273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20273 comm=syz-executor.4
17:45:50 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
[ 762.954256][T20273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20273 comm=syz-executor.4
[ 763.073698][T20273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20273 comm=syz-executor.4
17:45:50 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000001780)='/dev/uhid\x00', 0x0, 0x0)
fchmod(r0, 0x0)
[ 763.205988][T20273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20273 comm=syz-executor.4
17:45:50 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, 0x0, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
[ 763.373679][T20273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20273 comm=syz-executor.4
17:45:51 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:51 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
process_vm_readv(0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:51 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:51 executing program 3:
r0 = socket$kcm(0x10, 0x0, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:51 executing program 1:
17:45:51 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, 0x0, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:51 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807c0ee93ea1bb7f00a15deb269d0a91985602763e4d70d404da006a3d6e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:51 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:51 executing program 3:
r0 = socket$kcm(0x10, 0x0, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:51 executing program 1:
17:45:51 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:51 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:52 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:52 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:52 executing program 1:
17:45:52 executing program 3:
r0 = socket$kcm(0x10, 0x0, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:52 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:52 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:52 executing program 1:
17:45:52 executing program 3:
socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:52 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:52 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:52 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:53 executing program 3:
socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:53 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:53 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:53 executing program 1:
17:45:53 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:53 executing program 3:
socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0)
17:45:53 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:53 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
17:45:53 executing program 1:
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = eventfd2(0x3ff, 0x0)
write$eventfd(r0, &(0x7f00000000c0)=0xfffffffffffffffa, 0x8)
r1 = eventfd2(0x75, 0x0)
write$eventfd(r1, &(0x7f00000000c0)=0xfffffffffffffffb, 0x8)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
r2 = open(&(0x7f0000000040)='./bus\x00', 0x141142, 0x0)
ftruncate(r2, 0x2007fff)
sendfile(r1, r2, 0x0, 0x8000fffffffe)
[ 766.560859][T20369] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20369]
17:45:54 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:54 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, 0x0, 0x0)
17:45:54 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
[ 767.092008][T20385] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20385]
17:45:54 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0)
17:45:55 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:55 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:55 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, 0x0, 0x0)
[ 767.817607][T20396] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20396]
17:45:55 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
setuid(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
[ 767.983009][T20402] selinux_netlink_send: 50 callbacks suppressed
[ 767.983059][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz-executor.4
17:45:55 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, 0x0, 0x0)
17:45:55 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, 0x0, 0x0)
[ 768.090619][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz-executor.4
[ 768.194841][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz-executor.4
[ 768.260830][T20405] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20405]
[ 768.273087][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz-executor.4
[ 768.333240][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz-executor.4
17:45:55 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807c0ee93ea1bb7f00a15deb269d0a91985602763e4d70d404da006a3d6e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
17:45:55 executing program 1:
17:45:55 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
setuid(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
[ 768.379584][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz-executor.4
[ 768.555668][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz-executor.4
17:45:56 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0)
17:45:56 executing program 1:
[ 768.676118][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz-executor.4
[ 768.775279][T20414] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20414]
[ 768.790507][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz-executor.4
[ 768.875435][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz-executor.4
17:45:56 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, 0x0, 0x0)
17:45:56 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:56 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
17:45:56 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
setuid(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:56 executing program 1:
17:45:56 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0)
17:45:56 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, 0x0, 0x0)
[ 769.542898][T20434] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20434]
17:45:57 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0)
17:45:57 executing program 1:
17:45:57 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:57 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
[ 770.040963][T20445] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20445]
17:45:57 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0)
17:45:57 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)}, 0x0)
17:45:57 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:45:57 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:57 executing program 1:
17:45:57 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:57 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)}, 0x0)
[ 770.568342][T20455] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20455]
[ 770.672271][ C0] not chained 170000 origins
[ 770.676919][ C0] CPU: 0 PID: 624 Comm: kworker/u4:24 Not tainted 5.6.0-rc7-syzkaller #0
[ 770.685325][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 770.695374][ C0] Workqueue: krdsd rds_connect_worker
[ 770.700732][ C0] Call Trace:
[ 770.704002][ C0]
[ 770.706846][ C0] dump_stack+0x1c9/0x220
[ 770.711190][ C0] kmsan_internal_chain_origin+0x6f/0x130
[ 770.716899][ C0] ? should_fail+0x72/0x9e0
[ 770.721392][ C0] ? ret_from_fork+0x35/0x40
[ 770.725968][ C0] ? __msan_metadata_ptr_for_load_4+0x10/0x20
[ 770.732023][ C0] ? arch_stack_walk+0x34c/0x3e0
[ 770.736953][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 770.742147][ C0] ? __should_failslab+0x1f6/0x290
[ 770.747260][ C0] ? kmsan_get_metadata+0x4f/0x180
[ 770.752376][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 770.758182][ C0] ? __msan_metadata_ptr_for_store_2+0x13/0x20
[ 770.764325][ C0] ? tcp_parse_options+0x1ada/0x1b90
[ 770.769621][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 770.774809][ C0] __msan_chain_origin+0x50/0x90
[ 770.779738][ C0] tcp_conn_request+0x13ce/0x4d10
[ 770.784763][ C0] ? rb_first+0x31/0x100
[ 770.789027][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 770.794236][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 770.799446][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 770.804655][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 770.810479][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 770.815685][ C0] tcp_v4_conn_request+0x19b/0x240
[ 770.820806][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 770.825829][ C0] ? inet6_sk_rx_dst_set+0x3d0/0x3d0
[ 770.831103][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 770.836466][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 770.841653][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 770.847451][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 770.853527][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 770.858723][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 770.863315][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 770.867860][ C0] ? tcp_filter+0xf0/0xf0
[ 770.872177][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 770.877635][ C0] ip_local_deliver+0x62a/0x7c0
[ 770.882505][ C0] ? ip_local_deliver+0x7c0/0x7c0
[ 770.887523][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0
[ 770.893146][ C0] ip_rcv+0x6cf/0x750
[ 770.897131][ C0] ? ip_rcv_core+0x1270/0x1270
[ 770.901904][ C0] ? ip_local_deliver_finish+0x350/0x350
[ 770.907544][ C0] process_backlog+0xf0b/0x1410
[ 770.912402][ C0] ? ip_local_deliver_finish+0x350/0x350
[ 770.918067][ C0] ? rps_trigger_softirq+0x2e0/0x2e0
[ 770.923358][ C0] net_rx_action+0x786/0x1aa0
[ 770.928056][ C0] ? net_tx_action+0xc30/0xc30
[ 770.932829][ C0] __do_softirq+0x311/0x83d
[ 770.937420][ C0] do_softirq_own_stack+0x49/0x80
[ 770.942464][ C0]
[ 770.945401][ C0] __local_bh_enable_ip+0x184/0x1d0
[ 770.950604][ C0] local_bh_enable+0x36/0x40
[ 770.955210][ C0] ip_finish_output2+0x2115/0x2610
[ 770.960343][ C0] ? ctnetlink_net_exit_batch+0x180/0x180
[ 770.966075][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0
[ 770.972091][ C0] __ip_finish_output+0xaa7/0xd80
[ 770.977133][ C0] ip_finish_output+0x166/0x410
[ 770.982003][ C0] ip_output+0x593/0x680
[ 770.986270][ C0] ? ip_mc_finish_output+0x6c0/0x6c0
[ 770.991574][ C0] ? ip_finish_output+0x410/0x410
[ 770.997243][ C0] __ip_queue_xmit+0x1b5c/0x21a0
[ 771.002204][ C0] ? kmsan_set_origin_checked+0x95/0xf0
[ 771.007753][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 771.012977][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 771.018185][ C0] ip_queue_xmit+0xcc/0xf0
[ 771.022604][ C0] ? tcp_v4_fill_cb+0x580/0x580
[ 771.027462][ C0] __tcp_transmit_skb+0x439c/0x6090
[ 771.032665][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 771.038511][ C0] tcp_connect+0x4337/0x6920
[ 771.043117][ C0] ? __msan_poison_alloca+0xf0/0x120
[ 771.048402][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 771.053631][ C0] tcp_v4_connect+0x21fd/0x2370
[ 771.058527][ C0] ? tcp_twsk_unique+0xba0/0xba0
[ 771.063552][ C0] __inet_stream_connect+0x2fb/0x1340
[ 771.068924][ C0] ? __local_bh_enable_ip+0x97/0x1d0
[ 771.074230][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 771.079439][ C0] inet_stream_connect+0x101/0x180
[ 771.084560][ C0] ? __inet_stream_connect+0x1340/0x1340
[ 771.090195][ C0] rds_tcp_conn_path_connect+0x8a7/0xb80
[ 771.095845][ C0] ? kmsan_get_metadata+0x11d/0x180
[ 771.101065][ C0] ? rds_tcp_state_change+0x390/0x390
[ 771.106457][ C0] rds_connect_worker+0x2a6/0x470
[ 771.111500][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 771.117570][ C0] ? rds_addr_cmp+0x200/0x200
[ 771.122240][ C0] process_one_work+0x1555/0x1f40
[ 771.127301][ C0] worker_thread+0xef6/0x2450
[ 771.132018][ C0] kthread+0x4b5/0x4f0
[ 771.136085][ C0] ? process_one_work+0x1f40/0x1f40
[ 771.141313][ C0] ? kthread_blkcg+0xf0/0xf0
[ 771.145921][ C0] ret_from_fork+0x35/0x40
[ 771.150343][ C0] Uninit was stored to memory at:
[ 771.155371][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 771.161096][ C0] __msan_chain_origin+0x50/0x90
[ 771.166029][ C0] tcp_conn_request+0x1781/0x4d10
[ 771.171054][ C0] tcp_v4_conn_request+0x19b/0x240
[ 771.176167][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 771.181205][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 771.186570][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 771.191179][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 771.195685][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 771.201139][ C0] ip_local_deliver+0x62a/0x7c0
[ 771.205985][ C0] ip_rcv+0x6cf/0x750
[ 771.209960][ C0] process_backlog+0xf0b/0x1410
[ 771.214797][ C0] net_rx_action+0x786/0x1aa0
[ 771.219462][ C0] __do_softirq+0x311/0x83d
[ 771.223944][ C0]
[ 771.226265][ C0] Uninit was stored to memory at:
[ 771.231299][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 771.237011][ C0] __msan_chain_origin+0x50/0x90
[ 771.241963][ C0] tcp_openreq_init_rwin+0xc22/0xc80
[ 771.247271][ C0] tcp_conn_request+0x33d7/0x4d10
[ 771.252408][ C0] tcp_v4_conn_request+0x19b/0x240
[ 771.257532][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 771.262547][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 771.267921][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 771.272501][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 771.276997][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 771.282456][ C0] ip_local_deliver+0x62a/0x7c0
[ 771.287310][ C0] ip_rcv+0x6cf/0x750
[ 771.291285][ C0] process_backlog+0xf0b/0x1410
[ 771.296138][ C0] net_rx_action+0x786/0x1aa0
[ 771.300812][ C0] __do_softirq+0x311/0x83d
[ 771.305294][ C0]
[ 771.307677][ C0] Uninit was stored to memory at:
[ 771.312705][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 771.318429][ C0] __msan_chain_origin+0x50/0x90
[ 771.323370][ C0] tcp_conn_request+0x1781/0x4d10
[ 771.328389][ C0] tcp_v4_conn_request+0x19b/0x240
[ 771.333631][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 771.338659][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 771.344021][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 771.348622][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 771.353138][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 771.358604][ C0] ip_local_deliver+0x62a/0x7c0
[ 771.363445][ C0] ip_rcv+0x6cf/0x750
[ 771.367443][ C0] process_backlog+0xf0b/0x1410
[ 771.372446][ C0] net_rx_action+0x786/0x1aa0
[ 771.377128][ C0] __do_softirq+0x311/0x83d
[ 771.381612][ C0]
[ 771.383938][ C0] Uninit was stored to memory at:
[ 771.388983][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 771.394697][ C0] __msan_chain_origin+0x50/0x90
[ 771.399640][ C0] tcp_openreq_init_rwin+0xc22/0xc80
[ 771.404927][ C0] tcp_conn_request+0x33d7/0x4d10
[ 771.409956][ C0] tcp_v4_conn_request+0x19b/0x240
[ 771.415061][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 771.420087][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 771.425627][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 771.430211][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 771.434721][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 771.440176][ C0] ip_local_deliver+0x62a/0x7c0
[ 771.445017][ C0] ip_rcv+0x6cf/0x750
[ 771.448992][ C0] process_backlog+0xf0b/0x1410
[ 771.453853][ C0] net_rx_action+0x786/0x1aa0
[ 771.458528][ C0] __do_softirq+0x311/0x83d
[ 771.463014][ C0]
[ 771.465348][ C0] Uninit was stored to memory at:
[ 771.470395][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 771.476108][ C0] __msan_chain_origin+0x50/0x90
[ 771.481050][ C0] tcp_conn_request+0x1781/0x4d10
[ 771.486086][ C0] tcp_v4_conn_request+0x19b/0x240
[ 771.491196][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 771.496214][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 771.501602][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 771.506190][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 771.510687][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 771.516153][ C0] ip_local_deliver+0x62a/0x7c0
[ 771.521004][ C0] ip_rcv+0x6cf/0x750
[ 771.524996][ C0] process_backlog+0xf0b/0x1410
[ 771.529852][ C0] net_rx_action+0x786/0x1aa0
[ 771.534533][ C0] __do_softirq+0x311/0x83d
[ 771.539147][ C0]
[ 771.541465][ C0] Uninit was stored to memory at:
[ 771.546495][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 771.552212][ C0] __msan_chain_origin+0x50/0x90
[ 771.557154][ C0] tcp_openreq_init_rwin+0xc22/0xc80
[ 771.562436][ C0] tcp_conn_request+0x33d7/0x4d10
[ 771.567457][ C0] tcp_v4_conn_request+0x19b/0x240
[ 771.572556][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 771.577566][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 771.582924][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 771.587501][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 771.591992][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 771.597437][ C0] ip_local_deliver+0x62a/0x7c0
[ 771.602271][ C0] ip_rcv+0x6cf/0x750
[ 771.606244][ C0] process_backlog+0xf0b/0x1410
[ 771.611080][ C0] net_rx_action+0x786/0x1aa0
[ 771.615745][ C0] __do_softirq+0x311/0x83d
[ 771.620227][ C0]
[ 771.622543][ C0] Uninit was stored to memory at:
[ 771.627554][ C0] kmsan_internal_chain_origin+0xad/0x130
[ 771.633256][ C0] __msan_chain_origin+0x50/0x90
[ 771.638181][ C0] tcp_conn_request+0x1781/0x4d10
[ 771.643189][ C0] tcp_v4_conn_request+0x19b/0x240
[ 771.648296][ C0] tcp_v6_conn_request+0xb5/0x2d0
[ 771.653323][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 771.658697][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 771.663302][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 771.667815][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 771.673273][ C0] ip_local_deliver+0x62a/0x7c0
[ 771.678116][ C0] ip_rcv+0x6cf/0x750
[ 771.682091][ C0] process_backlog+0xf0b/0x1410
[ 771.686937][ C0] net_rx_action+0x786/0x1aa0
[ 771.691601][ C0] __do_softirq+0x311/0x83d
[ 771.696081][ C0]
[ 771.698394][ C0] Uninit was created at:
[ 771.702623][ C0] kmsan_save_stack_with_flags+0x3c/0x90
[ 771.708250][ C0] kmsan_alloc_page+0x12a/0x310
[ 771.713087][ C0] __alloc_pages_nodemask+0x5712/0x5e80
[ 771.718620][ C0] alloc_pages_current+0x67d/0x990
[ 771.723801][ C0] alloc_slab_page+0x111/0x12f0
[ 771.728642][ C0] new_slab+0x2bc/0x1130
[ 771.732884][ C0] ___slab_alloc+0x14a3/0x2040
[ 771.737638][ C0] kmem_cache_alloc+0xb23/0xd70
[ 771.742476][ C0] inet_reqsk_alloc+0xac/0x830
[ 771.747225][ C0] tcp_conn_request+0x753/0x4d10
[ 771.752160][ C0] tcp_v4_conn_request+0x19b/0x240
[ 771.757258][ C0] tcp_rcv_state_process+0x26b/0x71c0
[ 771.762616][ C0] tcp_v4_do_rcv+0xb0f/0xd70
[ 771.767191][ C0] tcp_v4_rcv+0x3f39/0x4d00
[ 771.771679][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 771.777125][ C0] ip_local_deliver+0x62a/0x7c0
[ 771.781964][ C0] ip_sublist_rcv+0x11fa/0x13c0
[ 771.786812][ C0] ip_list_rcv+0x8eb/0x950
[ 771.791218][ C0] __netif_receive_skb_list_core+0x1311/0x1380
[ 771.797357][ C0] netif_receive_skb_list_internal+0xf62/0x1620
[ 771.803582][ C0] napi_complete_done+0x2ef/0xb60
[ 771.808597][ C0] virtqueue_napi_complete+0xb9/0x1f0
[ 771.813954][ C0] virtnet_poll+0x1468/0x19f0
[ 771.818621][ C0] net_rx_action+0x786/0x1aa0
[ 771.823285][ C0] __do_softirq+0x311/0x83d
17:45:59 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0)
17:45:59 executing program 1:
17:45:59 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:45:59 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807c0ee93ea1bb7f00a15deb269d0a91985602763e4d70d404da006a3d6e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874565580000ffff00000000122e25d386dd", 0x0, 0x403, 0x0, 0x22d}, 0x28)
17:45:59 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)}, 0x0)
17:45:59 executing program 1:
[ 772.414029][T20469] ptrace attach of "/root/syz-executor.5"[11173] was attempted by "/root/syz-executor.5"[20469]
17:46:00 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:46:00 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:46:00 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0)
17:46:00 executing program 1:
17:46:00 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x0, 0x0, 0x0, 0x0, 0x403}, 0x40)
17:46:00 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0)
17:46:00 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
17:46:00 executing program 1:
17:46:00 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0)
17:46:00 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)}, 0x0)
17:46:01 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000fedfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07d3be8d43307c529a4ce6be614c2c794f72ebf5fe31789471702c9c2d5a9db90c8ac18143a5d904894ce42c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807c0ee93ea1bb7f00a15deb269d0a91985602763e4d70d404da006a3d6e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x0, 0x0, 0x0, 0x0, 0x403}, 0x40)
[ 773.536945][T20494] selinux_netlink_send: 35 callbacks suppressed
[ 773.536996][T20494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20494 comm=syz-executor.4
17:46:01 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0})
process_vm_readv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/64, 0x40}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0)
[ 773.693991][T20494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20494 comm=syz-executor.4
[ 773.798094][T20494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20494 comm=syz-executor.4
17:46:01 executing program 1:
[ 773.883396][T20494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20494 comm=syz-executor.4
[ 774.007120][T20494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20494 comm=syz-executor.4
[ 774.113641][T20494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20494 comm=syz-executor.4
[ 774.218874][T20494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20494 comm=syz-executor.4
[ 774.283556][T20494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20494 comm=syz-executor.4
[ 774.358344][T20494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20494 comm=syz-executor.4
[ 774.430312][T20494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20494 comm=syz-executor.4
17:46:01 executing program 4:
pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0})
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r7 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r7, 0x0, 0x4ffe0, 0x0)
17:46:01 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0)
17:46:01 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100)
sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)}, 0x0)
17:46:01 executing program 5:
r0 = inotify_init1(0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0,