0x0, 0xe845, 0x0, 0xfffe}, r2, 0xe, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/uts\x00')
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}, 0x10}, 0x78)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x2d1, 0x34000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477", 0x0, 0x100, 0x6000000000000000}, 0x28)
[ 418.561635][ T32] audit: type=1326 audit(1595360568.897:250): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12803 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
[ 418.667710][ C1] not chained 10000 origins
[ 418.672243][ C1] CPU: 1 PID: 501 Comm: kworker/u4:5 Not tainted 5.8.0-rc5-syzkaller #0
[ 418.676294][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 418.676294][ C1] Workqueue: krdsd rds_connect_worker
[ 418.676294][ C1] Call Trace:
[ 418.676294][ C1]
[ 418.676294][ C1] dump_stack+0x1df/0x240
[ 418.676294][ C1] kmsan_internal_chain_origin+0x6f/0x130
[ 418.676294][ C1] ? should_fail+0x72/0x9e0
[ 418.676294][ C1] ? ret_from_fork+0x22/0x30
[ 418.676294][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20
[ 418.676294][ C1] ? arch_stack_walk+0x34c/0x3e0
[ 418.676294][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 418.676294][ C1] ? __should_failslab+0x1f6/0x290
[ 418.676294][ C1] ? kmsan_get_metadata+0x4f/0x180
[ 418.676294][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 418.752927][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20
[ 418.752927][ C1] ? tcp_parse_options+0x1ada/0x1b90
[ 418.752927][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 418.752927][ C1] __msan_chain_origin+0x50/0x90
[ 418.771719][ C1] tcp_conn_request+0x13ce/0x4d10
[ 418.771719][ C1] ? ret_from_fork+0x22/0x30
[ 418.771719][ C1] ? in_task_stack+0x12c/0x210
[ 418.771719][ C1] ? kmsan_task_context_state+0x47/0x90
[ 418.771719][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 418.771719][ C1] tcp_v4_conn_request+0x19b/0x240
[ 418.771719][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 418.771719][ C1] ? inet6_sk_rx_dst_set+0x400/0x400
[ 418.771719][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 418.771719][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 418.771719][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 418.771719][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 418.771719][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 418.771719][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 418.771719][ C1] tcp_v4_rcv+0x425c/0x5040
[ 418.771719][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20
[ 418.771719][ C1] ? tcp_filter+0xf0/0xf0
[ 418.771719][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 418.771719][ C1] ip_local_deliver+0x62a/0x7c0
[ 418.771719][ C1] ? ip_local_deliver+0x7c0/0x7c0
[ 418.771719][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0
[ 418.771719][ C1] ip_rcv+0x6cf/0x750
[ 418.771719][ C1] ? ip_rcv_core+0x12c0/0x12c0
[ 418.771719][ C1] ? ip_local_deliver_finish+0x350/0x350
[ 418.771719][ C1] process_backlog+0xfb5/0x14e0
[ 418.771719][ C1] ? lapic_next_event+0x6e/0xa0
[ 418.771719][ C1] ? rps_trigger_softirq+0x2e0/0x2e0
[ 418.771719][ C1] net_rx_action+0x746/0x1aa0
[ 418.771719][ C1] ? net_tx_action+0xc40/0xc40
[ 418.771719][ C1] __do_softirq+0x311/0x83d
[ 418.771719][ C1] asm_call_on_stack+0x12/0x20
[ 418.771719][ C1]
[ 418.771719][ C1] do_softirq_own_stack+0x7c/0xa0
[ 418.771719][ C1] __local_bh_enable_ip+0x184/0x1d0
[ 418.771719][ C1] local_bh_enable+0x36/0x40
[ 418.771719][ C1] ip_finish_output2+0x1fee/0x24a0
[ 418.771719][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0
[ 418.771719][ C1] __ip_finish_output+0xaa7/0xd80
[ 418.771719][ C1] ip_finish_output+0x166/0x410
[ 418.771719][ C1] ip_output+0x593/0x680
[ 418.771719][ C1] ? ip_mc_finish_output+0x6c0/0x6c0
[ 418.771719][ C1] ? ip_finish_output+0x410/0x410
[ 418.771719][ C1] __ip_queue_xmit+0x1b5c/0x21a0
[ 418.771719][ C1] ? kmsan_set_origin_checked+0x95/0xf0
[ 418.771719][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 418.771719][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 418.771719][ C1] ip_queue_xmit+0xcc/0xf0
[ 418.771719][ C1] ? tcp_v4_fill_cb+0x580/0x580
[ 418.771719][ C1] __tcp_transmit_skb+0x440e/0x6090
[ 418.771719][ C1] tcp_connect+0x4208/0x6830
[ 418.771719][ C1] ? __msan_poison_alloca+0xf0/0x120
[ 418.771719][ C1] tcp_v4_connect+0x21fd/0x2370
[ 418.771719][ C1] ? tcp_twsk_unique+0xba0/0xba0
[ 418.771719][ C1] __inet_stream_connect+0x2fb/0x1340
[ 418.771719][ C1] ? __local_bh_enable_ip+0x97/0x1d0
[ 418.771719][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 418.771719][ C1] inet_stream_connect+0x101/0x180
[ 418.771719][ C1] ? __inet_stream_connect+0x1340/0x1340
[ 418.771719][ C1] rds_tcp_conn_path_connect+0x8a7/0xb70
[ 418.771719][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 418.771719][ C1] ? rds_tcp_state_change+0x390/0x390
[ 418.771719][ C1] rds_connect_worker+0x2a6/0x470
[ 418.771719][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 418.771719][ C1] ? rds_addr_cmp+0x200/0x200
[ 418.771719][ C1] process_one_work+0x1540/0x1f30
[ 418.771719][ C1] worker_thread+0xed2/0x23f0
[ 418.771719][ C1] kthread+0x515/0x550
[ 418.771719][ C1] ? process_one_work+0x1f30/0x1f30
[ 418.771719][ C1] ? kthread_blkcg+0xf0/0xf0
[ 418.771719][ C1] ret_from_fork+0x22/0x30
[ 418.771719][ C1] Uninit was stored to memory at:
[ 418.771719][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 418.771719][ C1] __msan_chain_origin+0x50/0x90
[ 418.771719][ C1] tcp_conn_request+0x1781/0x4d10
[ 418.771719][ C1] tcp_v4_conn_request+0x19b/0x240
[ 418.771719][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 418.771719][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 418.771719][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 418.771719][ C1] tcp_v4_rcv+0x425c/0x5040
[ 418.771719][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 418.771719][ C1] ip_local_deliver+0x62a/0x7c0
[ 418.771719][ C1] ip_rcv+0x6cf/0x750
[ 418.771719][ C1] process_backlog+0xfb5/0x14e0
[ 418.771719][ C1] net_rx_action+0x746/0x1aa0
[ 418.771719][ C1] __do_softirq+0x311/0x83d
[ 418.771719][ C1]
[ 418.771719][ C1] Uninit was stored to memory at:
[ 418.771719][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 418.771719][ C1] __msan_chain_origin+0x50/0x90
[ 418.771719][ C1] tcp_openreq_init_rwin+0xc21/0xc80
[ 418.771719][ C1] tcp_conn_request+0x33d7/0x4d10
[ 418.771719][ C1] tcp_v4_conn_request+0x19b/0x240
[ 418.771719][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 418.771719][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 418.771719][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 418.771719][ C1] tcp_v4_rcv+0x425c/0x5040
[ 418.771719][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 418.771719][ C1] ip_local_deliver+0x62a/0x7c0
[ 418.771719][ C1] ip_rcv+0x6cf/0x750
[ 418.771719][ C1] process_backlog+0xfb5/0x14e0
[ 418.771719][ C1] net_rx_action+0x746/0x1aa0
[ 418.771719][ C1] __do_softirq+0x311/0x83d
[ 418.771719][ C1]
[ 418.771719][ C1] Uninit was stored to memory at:
[ 418.771719][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 418.771719][ C1] __msan_chain_origin+0x50/0x90
[ 418.771719][ C1] tcp_conn_request+0x1781/0x4d10
[ 418.771719][ C1] tcp_v4_conn_request+0x19b/0x240
[ 418.771719][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 418.771719][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 418.771719][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 418.771719][ C1] tcp_v4_rcv+0x425c/0x5040
[ 418.771719][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 418.771719][ C1] ip_local_deliver+0x62a/0x7c0
[ 418.771719][ C1] ip_rcv+0x6cf/0x750
[ 418.771719][ C1] process_backlog+0xfb5/0x14e0
[ 418.771719][ C1] net_rx_action+0x746/0x1aa0
[ 418.771719][ C1] __do_softirq+0x311/0x83d
[ 418.771719][ C1]
[ 418.771719][ C1] Uninit was stored to memory at:
[ 418.771719][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 418.771719][ C1] __msan_chain_origin+0x50/0x90
[ 418.771719][ C1] tcp_openreq_init_rwin+0xc21/0xc80
[ 418.771719][ C1] tcp_conn_request+0x33d7/0x4d10
[ 418.771719][ C1] tcp_v4_conn_request+0x19b/0x240
[ 418.771719][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 418.771719][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 418.771719][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 418.771719][ C1] tcp_v4_rcv+0x425c/0x5040
[ 418.771719][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 418.771719][ C1] ip_local_deliver+0x62a/0x7c0
[ 418.771719][ C1] ip_rcv+0x6cf/0x750
[ 418.771719][ C1] process_backlog+0xfb5/0x14e0
[ 418.771719][ C1] net_rx_action+0x746/0x1aa0
[ 418.771719][ C1] __do_softirq+0x311/0x83d
[ 418.771719][ C1]
[ 418.771719][ C1] Uninit was stored to memory at:
[ 418.771719][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 418.771719][ C1] __msan_chain_origin+0x50/0x90
[ 418.771719][ C1] tcp_conn_request+0x1781/0x4d10
[ 418.771719][ C1] tcp_v4_conn_request+0x19b/0x240
[ 418.771719][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 418.771719][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 418.771719][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 418.771719][ C1] tcp_v4_rcv+0x425c/0x5040
[ 418.771719][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 418.771719][ C1] ip_local_deliver+0x62a/0x7c0
[ 418.771719][ C1] ip_rcv+0x6cf/0x750
[ 418.771719][ C1] process_backlog+0xfb5/0x14e0
[ 418.771719][ C1] net_rx_action+0x746/0x1aa0
[ 418.771719][ C1] __do_softirq+0x311/0x83d
[ 418.771719][ C1]
[ 418.771719][ C1] Uninit was stored to memory at:
[ 418.771719][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 418.771719][ C1] __msan_chain_origin+0x50/0x90
[ 418.771719][ C1] tcp_openreq_init_rwin+0xc21/0xc80
[ 418.771719][ C1] tcp_conn_request+0x33d7/0x4d10
[ 418.771719][ C1] tcp_v4_conn_request+0x19b/0x240
[ 418.771719][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 418.771719][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 418.771719][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 418.771719][ C1] tcp_v4_rcv+0x425c/0x5040
[ 418.771719][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 418.771719][ C1] ip_local_deliver+0x62a/0x7c0
[ 418.771719][ C1] ip_rcv+0x6cf/0x750
[ 418.771719][ C1] process_backlog+0xfb5/0x14e0
[ 418.771719][ C1] net_rx_action+0x746/0x1aa0
[ 418.771719][ C1] __do_softirq+0x311/0x83d
[ 418.771719][ C1]
[ 418.771719][ C1] Uninit was stored to memory at:
[ 418.771719][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 418.771719][ C1] __msan_chain_origin+0x50/0x90
[ 418.771719][ C1] tcp_conn_request+0x1781/0x4d10
[ 418.771719][ C1] tcp_v4_conn_request+0x19b/0x240
[ 418.771719][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 418.771719][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 418.771719][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 418.771719][ C1] tcp_v4_rcv+0x425c/0x5040
[ 418.771719][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 418.771719][ C1] ip_local_deliver+0x62a/0x7c0
[ 418.771719][ C1] ip_rcv+0x6cf/0x750
[ 418.771719][ C1] process_backlog+0xfb5/0x14e0
[ 418.771719][ C1] net_rx_action+0x746/0x1aa0
[ 418.771719][ C1] __do_softirq+0x311/0x83d
[ 418.771719][ C1]
[ 418.771719][ C1] Uninit was created at:
[ 418.771719][ C1] kmsan_save_stack_with_flags+0x3c/0x90
[ 418.771719][ C1] kmsan_alloc_page+0xb9/0x180
[ 418.771719][ C1] __alloc_pages_nodemask+0x56a2/0x5dc0
[ 418.771719][ C1] alloc_pages_current+0x672/0x990
[ 418.771719][ C1] alloc_slab_page+0x122/0x1300
[ 418.771719][ C1] new_slab+0x2bc/0x1130
[ 418.771719][ C1] ___slab_alloc+0x14a3/0x2040
[ 418.771719][ C1] kmem_cache_alloc+0xb23/0xd70
[ 418.771719][ C1] inet_reqsk_alloc+0xac/0x830
[ 418.771719][ C1] tcp_conn_request+0x753/0x4d10
[ 418.771719][ C1] tcp_v4_conn_request+0x19b/0x240
[ 418.771719][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 418.771719][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 418.771719][ C1] tcp_v4_rcv+0x425c/0x5040
[ 418.771719][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 418.771719][ C1] ip_local_deliver+0x62a/0x7c0
[ 418.771719][ C1] ip_sublist_rcv+0x125d/0x1450
[ 418.771719][ C1] ip_list_rcv+0x904/0x970
[ 418.771719][ C1] __netif_receive_skb_list_core+0x1459/0x14d0
19:42:50 executing program 3:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0xa, 0x802, 0x88)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499cde2bbaf4b06d3585a09a87507ebf4e43bc06"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28)
socket$kcm(0x2b, 0x1, 0x0)
[ 418.771719][ C1] netif_receive_skb_list_internal+0xf66/0x1610
[ 418.771719][ C1] napi_complete_done+0x439/0xe10
[ 418.771719][ C1] virtqueue_napi_complete+0xb9/0x1f0
[ 418.771719][ C1] virtnet_poll+0x1468/0x19f0
[ 418.771719][ C1] net_rx_action+0x746/0x1aa0
[ 418.771719][ C1] __do_softirq+0x311/0x83d
[ 419.821366][ T32] audit: type=1326 audit(1595360570.157:251): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12790 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:50 executing program 1:
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r2, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r1, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:42:50 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x3, 0x1}, {0x0, 0x0, 0xfc}, {0x6}]})
19:42:50 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x5}, {}, {0x6}]})
19:42:50 executing program 4:
r0 = socket$kcm(0x29, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
socket$kcm(0x2, 0x0, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="e1", 0x1}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x40800)
sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0)
[ 420.507760][ T32] audit: type=1326 audit(1595360570.847:252): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12829 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:50 executing program 0:
socket$kcm(0x2, 0x3, 0x2)
r0 = socket$kcm(0x2, 0xa, 0x2)
ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040))
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast})
19:42:51 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x2, 0x2, 0x0)
setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000400), 0x8)
sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0)
close(r0)
19:42:51 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1, 0xfffffffc}, {0xfffd, 0x3}, {0x6, 0x0, 0x0, 0x1}]})
r0 = gettid()
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x9, r0, 0x0, 0x0)
fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000100)={0x2, 0x0, 0x9f49, 0x5, r0})
r1 = socket$netlink(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r4 = dup2(r3, r2)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0})
sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_PROXYARP_WIFI={0x5}]}}}]}, 0x44}}, 0x0)
ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0)
r7 = socket$netlink(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r10 = dup2(r9, r8)
ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0})
sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_PROXYARP_WIFI={0x5}]}}}]}, 0x44}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
dup2(r13, r12)
kcmp(r0, r6, 0x9b68168ec59bab3f, r7, r12)
19:42:51 executing program 1:
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r2, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r1, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
[ 420.839583][T12841] device vlan0 entered promiscuous mode
19:42:51 executing program 0:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000035000511d25a80648c63940d0324fc60040000000a0003000200000037153e370a00098002000000d1bd", 0x33fe0}], 0x1}, 0x0)
19:42:51 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x29, 0x0, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0xa, 0x0, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499cde2bbaf4b06d3585a09a87507ebf4e43bc06"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
19:42:51 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req3={0x6, 0x7077, 0x1f, 0x6, 0x8, 0x972, 0x952d}, 0x1c)
19:42:51 executing program 3:
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
r1 = socket$kcm(0x2b, 0x1, 0x0)
sendmsg$inet(r1, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019)
r2 = socket$kcm(0x2, 0x200000000000001, 0x0)
sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4)
close(r0)
19:42:51 executing program 1:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:42:51 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6, 0xfe}]})
syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x8, 0x50100)
[ 421.592050][ T32] audit: type=1326 audit(1595360571.927:253): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12865 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:52 executing program 4:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020031000505d25a80648c63940d0f24fc601000314002000000051a82c137153e670800038014000000d1bd", 0x33fe0}], 0x1}, 0x0)
19:42:52 executing program 0:
r0 = socket$kcm(0x2, 0x3, 0x2)
ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote})
socket$kcm(0x2, 0xa, 0x2)
recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpid()
openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xca, 0x3, 0x0, 0xfe, 0x0, 0x0, 0x22008, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa40c, 0x0, @perf_config_ext={0x8ce2, 0x82e}, 0x0, 0x800, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000a40)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78)
bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYBLOB="00000000000000001c0a0000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x4}, 0x8, 0x10, 0x0}, 0x78)
sendmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000002580)=@ll={0x11, 0x6, 0x0, 0x1, 0x2, 0x6, @local}, 0x80, &(0x7f0000002880)=[{&(0x7f0000002600)}, {&(0x7f0000002680)}, {0x0}], 0x3}, 0x14)
ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040))
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
[ 421.769955][ T32] audit: type=1326 audit(1595360572.097:254): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12871 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:52 executing program 3:
r0 = socket$kcm(0x29, 0x2, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
r2 = socket$kcm(0x2, 0x200000000000001, 0x0)
sendmsg$inet(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811)
socket$kcm(0x29, 0x7, 0x0)
ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r2, r1})
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, r3, 0x0)
r4 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
close(r4)
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0)
sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000280)="04", 0x140000}], 0x1}, 0x0)
[ 422.055830][T12881] device vlan0 left promiscuous mode
19:42:52 executing program 4:
r0 = socket$kcm(0x10, 0x0, 0x0)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="2e00000010008108040f9becdb4cb92e0a48b13763000000000000002503eaff0d000100020200bf050005001201", 0x2e}], 0x1}, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0)
socket$kcm(0x2, 0x1000000000000002, 0x0)
openat$cgroup_devices(r2, &(0x7f0000000300)='devices.allow\x00', 0x2, 0x0)
gettid()
r3 = getpid()
perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x1}, 0x43d62, 0xc88, 0x0, 0x6, 0x36eb, 0x2863}, r3, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
[ 422.344743][ T32] audit: type=1326 audit(1595360572.677:255): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12865 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:52 executing program 1:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
[ 422.599512][ T32] audit: type=1326 audit(1595360572.937:256): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12871 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:53 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f00000000c0))
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r5 = dup2(r4, r3)
ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
getsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4)
19:42:53 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0)
perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
19:42:53 executing program 3:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b700000001000000bfa30000000000000703000020feffff720af0fff8ffffff71a4f0ff000000003f040000000000005d400500000000004704000001ed00007b130000000000001d440000000000007a0a00fe00ffffffdb03000000000000b5000000000000009500000000000000023bc065b7a379d17cf9333379fc9e94af69912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5e69048ddff6da4e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03fb8a63e089679216da18ec0ae564162a27afea62d84f3a10746443d64364f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d710b651f898ba749e40bc6980fe78683ac5c0c31030699ddd71063be9261b2e1aab1675b34a2204800000000f5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe0e669e51731b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed82641687f3b3a70bfe9b4a9c5a90ff59d54d1f92ecb3e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24c87afce829ba0f85da6d888f18ea40ab959f6074ab2a4009b9e5f07ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0cbe02b6e4114f244a9bf93f04beb72f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a9b702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b728fe26e37037f27feeb744ddcc536cbae315c7d951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91114a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a9037d2283fdd23aadd99bfd20fc50cec42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293986e02c8e0a6dda1eca493f1479531dd8826fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a8784d0899ed888141e2fae6691d1aee1da02ba516467df3e7d1daac19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec01a8aa7749f3187e9efb00"/1516], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
gettid()
perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000840)={0x0, 0x70, 0x5b, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x20010, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xa7, 0x3}, 0x8000, 0x0, 0x7fff, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3)
19:42:53 executing program 1:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:42:53 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$kcm(0x2, 0x5, 0x84)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000019c0)='cgroup.controllers\x00', 0x26e1, 0x0)
r1 = socket$kcm(0x2, 0x1000000000000002, 0x0)
setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161)
sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000380)=@in={0x2, 0x4e21, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10)
socketpair$tipc(0x1e, 0x0, 0x0, 0x0)
socket$kcm(0x29, 0x0, 0x0)
sendmsg$inet(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x0)
write$cgroup_subtree(r1, 0x0, 0x0)
[ 423.023712][ T32] audit: type=1326 audit(1595360573.357:257): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12900 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:53 executing program 4:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904021d650400027c05e8fe55a10a000600ac14142603000e12080005000000812f0300040008000300e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0)
19:42:54 executing program 0:
r0 = socket$kcm(0x29, 0x5, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x2, 0x200000000000001, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendmsg$inet(0xffffffffffffffff, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0)
sendmsg$kcm(r0, &(0x7f0000000180)={&(0x7f0000000480)=@phonet, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)="b5cebab2d6e45f550c7d17bb74b6cdf11161cc0e6d89309e8314c7087d18613d073caa759a592b9b8835ac1da98d4b5dc113d64e1fff730768140c9cfdcd041e5a7346595aa86f7e266980047ca0de6a952114ee25a596ac6f744d576f73db5a0009e749b2f9798b11dff7e55e851cb9a6742cd0c4cb0c89", 0x78}, {&(0x7f0000000580)="69cb6e8992fca01edf92a0801e30f87877e4ba432bd29be5363a4f6c4d9d763b13fa9fe9376e77703260e77bcee5f15e0ee8b288b88c6a9bcbe57662b8b4780451ef294d1d2ed06c61b623bc3179fff15e2439e75c66d404ec9708116889458531223a69cc1b1cafdb887b0ab01c0a", 0x6f}, {&(0x7f0000000600)="cb9ac475475bc9d20688ca7dfd1a5bc81ccd8abbe5e2dfac3e0b74951723dbe93b4f6846b811dc4eaac3593f16e40c6aab03bb0177bd9f0d597fa2b743b7b1287d9f7a98b1c8e20036f33c3c521cb1e494d7ea97cbd4d8892f686c7d329e8513712face8", 0x64}, {&(0x7f0000000680)="dcf1e60e774327472a4136cfb0542276e2bfe4fb314f47373f213dc49520168533aafa561ec3115aa891b1f80f1bf4bf5b5b5229cb6e61275e88dc39bf4d6051158ad16c5e2942acda7c6e58", 0x4c}, {&(0x7f0000001040)="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", 0x5b}, {&(0x7f0000000f00)="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"/280, 0xffffff18}, {&(0x7f0000000100)}], 0x7, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0xb8}, 0x44000)
19:42:54 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r2, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r1, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:42:54 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00')
r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380)='batadv\x00')
r5 = socket$inet(0x2, 0x3, 0x2)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0})
recvmmsg(0xffffffffffffffff, &(0x7f0000004740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000003c0)={0x1c, r4, 0x31905e13403123b7, 0x0, 0x0, {0x5, 0x0, 0xf000}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x1c}, 0x1, 0x50000}, 0x0)
r7 = socket$nl_route(0x10, 0x3, 0x0)
r8 = socket$netlink(0x10, 0x3, 0x0)
r9 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0)
sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00-\x00<\x00'/20, @ANYRES32=r10, @ANYBLOB="000000000000ffff00000000"], 0x24}}, 0x0)
sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r4, 0x20, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r10}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x801)
sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000280)={0x1c, r3, 0x1, 0x0, 0x0, {0x5}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="040029bd7000fbdbd725000000000800090003000000"], 0x1c}}, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:42:54 executing program 3:
[ 423.690211][T12919] netlink: 'syz-executor.4': attribute type 6 has an invalid length.
[ 423.698787][T12919] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 423.787224][ T32] audit: type=1326 audit(1595360574.127:258): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12900 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
[ 423.862446][T12924] netlink: 'syz-executor.4': attribute type 6 has an invalid length.
[ 423.870817][T12924] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 423.909110][T12925] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 424.003273][ T32] audit: type=1326 audit(1595360574.327:259): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12922 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:54 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000000)={0x0, 0x1dd0509c, 0x3})
19:42:54 executing program 3:
19:42:54 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r2, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r1, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:42:54 executing program 4:
[ 424.426961][ T32] audit: type=1326 audit(1595360574.757:260): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12937 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:55 executing program 3:
[ 424.697762][T12945] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'.
19:42:55 executing program 4:
19:42:55 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {0x0, 0x0, 0x0, 0x7}, {0x6, 0x0, 0x0, 0x8}]})
19:42:55 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r2, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r1, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:42:55 executing program 0:
[ 425.207975][ T32] audit: type=1326 audit(1595360575.547:261): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12937 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:55 executing program 3:
19:42:55 executing program 4:
[ 425.352137][ T32] audit: type=1326 audit(1595360575.687:262): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12950 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:55 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$RTC_PIE_ON(r2, 0x7005)
19:42:56 executing program 3:
19:42:56 executing program 0:
[ 425.751892][ T32] audit: type=1326 audit(1595360576.087:263): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12960 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:56 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000))
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r2, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r1, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:42:56 executing program 4:
19:42:56 executing program 3:
19:42:56 executing program 0:
19:42:56 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
dup2(r3, r2)
ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000000)={{0x1, 0x0, @identifier="60feb9d41eb45ffa3007708705c98cd3"}})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f00000000c0))
19:42:56 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000))
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r2, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r1, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:42:56 executing program 4:
19:42:56 executing program 3:
[ 426.486584][ T32] audit: type=1326 audit(1595360576.817:264): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12960 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:56 executing program 0:
[ 426.617165][ T32] audit: type=1326 audit(1595360576.937:265): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12980 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:57 executing program 2:
r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x2, 0x60000)
ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000100))
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000))
19:42:57 executing program 4:
19:42:57 executing program 3:
19:42:57 executing program 0:
19:42:57 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000))
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r2, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r1, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
[ 427.094770][ T32] audit: type=1326 audit(1595360577.427:266): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12990 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:57 executing program 4:
19:42:57 executing program 3:
19:42:57 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00')
sendmsg$NLBL_UNLABEL_C_STATICLIST(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, r2, 0x10, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010102}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:system_r:kernel_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv_slave_1\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000000)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:42:57 executing program 0:
19:42:57 executing program 4:
19:42:57 executing program 3:
19:42:57 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r2, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r1, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:42:58 executing program 3:
19:42:58 executing program 4:
19:42:58 executing program 0:
19:42:58 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r5 = dup2(r4, r3)
ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$PPPIOCSMRRU(r5, 0x4004743b, &(0x7f0000000000)=0x7f)
19:42:58 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r2, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r1, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:42:58 executing program 3:
19:42:58 executing program 0:
19:42:59 executing program 5:
r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40200, 0x0)
getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f00000000c0)=""/244, &(0x7f00000001c0)=0xf4)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:42:59 executing program 4:
19:42:59 executing program 2:
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x40)
ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000040)=r3)
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r4, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3f}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1003}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x16}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1e}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x4050)
19:42:59 executing program 3:
19:42:59 executing program 0:
19:42:59 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r2, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r1, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:42:59 executing program 4:
[ 429.028689][ T32] kauditd_printk_skb: 3 callbacks suppressed
[ 429.028749][ T32] audit: type=1326 audit(1595360579.367:270): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13035 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:42:59 executing program 3:
19:42:59 executing program 0:
19:42:59 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000540)=[{0x15, 0x0, 0x1}, {}, {0x9}]})
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvram\x00', 0x0, 0x0)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={&(0x7f00000000c0)="b85323322db4306473239a6a90641d6440acf81decee49f9a720c715d51fd1c219e483d7eb95cd9f4efbe617050c1241069e416378d774e145772b9f699974be0871bdf68bba0bb150d1689c6f073b168e3ca21691a27ed401ec1a", &(0x7f0000000140)=""/124, &(0x7f00000001c0)="c275ef006cd66b42b3889f87972534182d95ffc878591c79246a9b44736a1a046a302ca961fb25a4d362c29ab806f12946ce2c74b4a5b2d9495ea9cff7e680cb36ce4646db3ed9de71e0aed7f66973d73c1ef13e06a6ebed9442fae70d2c2c89f004800745e9762365ec1602acdacdbd561852ba31d4c970cde21fe551c4df03797ade5480a921839536b989b5f8bf8b374e2abd5265149bf38537d84d33a7bf32e476d234b0c29bae3659905a6782a344df94ba24dc5ae049551ab54ff54169ff", &(0x7f0000000000)="650f6fefdedd2a", 0x800, r0, 0x4}, 0x38)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff})
r3 = dup2(r2, r1)
ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f0000000040)={0x8, 'vcan0\x00', {'macsec0\x00'}, 0x1000})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
dup2(r5, r4)
dup2(r5, r3)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
setsockopt$inet6_dccp_int(r3, 0x21, 0x10, &(0x7f00000003c0)=0xffffffff, 0x4)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000340)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0x3, @remote, 0x3}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, @in6={0xa, 0x4e22, 0x8000, @private2, 0x4}], 0x58)
ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000440)={0x6, 0xffff, 0x7, 0x0, 0x2, "04a3b47756a5e211"})
getsockopt$inet6_buf(r3, 0x29, 0x2f, &(0x7f0000000480)=""/77, &(0x7f0000000500)=0x4d)
ioctl$KDSKBLED(r0, 0x4b65, 0x8)
19:42:59 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:42:59 executing program 4:
19:43:00 executing program 3:
19:43:00 executing program 0:
19:43:00 executing program 2:
r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
r1 = geteuid()
r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0)
r3 = openat$udambuf(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/udmabuf\x00', 0x2)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x375)
setfsgid(r4)
fsetxattr$system_posix_acl(r3, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000010005000000000002000100", @ANYRES32=r1, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="0200a5b2", @ANYRES32=r1, @ANYBLOB="040004030000007140000708", @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB="08000300", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB="10000000000000002000020000000000"], 0x64, 0x1)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000200)=0x1c, 0x80800)
ioctl$SNDRV_PCM_IOCTL_REWIND(r2, 0x40084146, &(0x7f0000000000)=0x80)
19:43:00 executing program 4:
19:43:00 executing program 5:
socket$unix(0x1, 0x1, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
dup2(r1, r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
dup2(r3, r2)
fstat(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0})
fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x7fffffff, 0x80000000}, {0x8, 0x7ff}], r4}, 0x18, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:43:00 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:00 executing program 4:
19:43:00 executing program 0:
[ 430.137623][ T32] audit: type=1326 audit(1595360580.467:271): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13058 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
[ 430.246718][ T32] audit: type=1326 audit(1595360580.497:272): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13059 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:00 executing program 3:
19:43:00 executing program 4:
19:43:00 executing program 0:
19:43:00 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:01 executing program 3:
19:43:01 executing program 4:
[ 430.852862][ T32] audit: type=1326 audit(1595360581.187:273): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13058 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
[ 430.976796][ T32] audit: type=1326 audit(1595360581.237:274): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13059 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:01 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x200000000000017e, &(0x7f0000000040)})
19:43:01 executing program 0:
19:43:01 executing program 3:
19:43:01 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4e000, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:43:01 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x0, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:01 executing program 4:
[ 431.335890][ T32] audit: type=1326 audit(1595360581.667:275): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13088 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:01 executing program 0:
19:43:01 executing program 3:
19:43:01 executing program 4:
19:43:01 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
recvmsg$can_bcm(r2, &(0x7f0000000240)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/209, 0xd1}], 0x1}, 0x2002)
bind$isdn_base(r3, &(0x7f0000000280)={0x22, 0x1, 0x10, 0x7f, 0xba}, 0x6)
19:43:02 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x0, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:02 executing program 0:
[ 431.839827][ T32] audit: type=1326 audit(1595360582.177:276): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13101 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:02 executing program 3:
19:43:02 executing program 4:
[ 432.133577][ T32] audit: type=1326 audit(1595360582.467:277): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13088 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:02 executing program 4:
19:43:02 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r3 = dup2(r2, r1)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
sendmsg$NFT_MSG_GETSET(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1008100}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xf8, 0xa, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_DESC={0xe4, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0xd8, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xebe4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x10000}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7ff}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1ff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xaa}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7d4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0xc5}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x5}, 0x804)
r4 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:43:02 executing program 0:
19:43:02 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x0, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:02 executing program 3:
[ 432.610984][ T32] audit: type=1326 audit(1595360582.937:278): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13101 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:03 executing program 3:
19:43:03 executing program 4:
[ 432.738960][ T32] audit: type=1326 audit(1595360582.987:279): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13118 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:03 executing program 0:
19:43:03 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x0, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:03 executing program 3:
19:43:03 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r7 = dup2(r6, r5)
ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
read$snddsp(r7, &(0x7f00000001c0)=""/104, 0x68)
r8 = dup2(r4, r3)
ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
r9 = socket$inet6_sctp(0xa, 0x5, 0x84)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0))
shutdown(0xffffffffffffffff, 0x1)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10)
r10 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r9, 0x84, 0x9, &(0x7f0000000080)={r11, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000000)=0x9c)
getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000000)={0x8000, 0x6, 0x65bc0c04, 0x73da, r11}, &(0x7f00000000c0)=0x10)
setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={r12, 0x9d55}, 0x8)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
19:43:03 executing program 4:
19:43:03 executing program 0:
19:43:03 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r4 = dup2(r3, r2)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000000c0)={0x2, 'syz1\x00'})
ioctl$VIDIOC_STREAMOFF(r4, 0x40045613, &(0x7f0000000000)=0x3)
ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x6b61)
19:43:03 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x0, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:03 executing program 3:
19:43:03 executing program 0:
19:43:03 executing program 4:
19:43:04 executing program 3:
19:43:04 executing program 0:
19:43:04 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x0, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:04 executing program 4:
19:43:04 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000000)=0x3, 0xfffffffffffffd9c)
19:43:04 executing program 3:
19:43:04 executing program 0:
[ 434.499263][ T32] kauditd_printk_skb: 2 callbacks suppressed
[ 434.499320][ T32] audit: type=1326 audit(1595360584.837:282): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13160 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
[ 434.575243][ T32] audit: type=1326 audit(1595360584.897:283): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13146 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:05 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:05 executing program 4:
19:43:05 executing program 3:
19:43:05 executing program 0:
19:43:05 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x1f, 0xe6, &(0x7f0000000300)="82b457864962227ce3a25b5e21004dc5e1f9ad79df95f2bb6378c548813f451bc97bd3dab86de8155411f86ca0a910d97bfc7fc105acf99564d40819cf74a20724ff4a39f7d0b589de94b047fbcd0443f2d0639d9ca7a173f0306cd3380f4f2ef5c5d3df9c667fbd17fe64c66a7bf180477c24d77bb91fe4a3bf5c2df1945b80a6be522385c44afb52ea8b75e487b6534d0e98455c747e60605b794ee329b7022b411a27747c294db23a99e317c8428748c836ac0672dd84f145eaf24f8bd06e733cb3c3894f7b0f77044b164a2a58ac0e66aeea917f49d6cca19fc3525b05de5a4d27e22284"})
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0)
sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@delchain={0x24, 0x2d, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}}, 0x24}}, 0x0)
setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000440)={r6, @local, @remote}, 0xc)
r7 = socket$unix(0x1, 0x1, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
recvmsg$can_bcm(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/238, 0xee}, {&(0x7f00000001c0)=""/136, 0x88}], 0x2, &(0x7f0000000280)=""/37, 0x25}, 0x40002000)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:43:05 executing program 3:
[ 434.885262][T13173] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 434.965369][ T32] audit: type=1326 audit(1595360585.297:284): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13172 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:05 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:05 executing program 0:
19:43:05 executing program 4:
[ 435.285822][ T32] audit: type=1326 audit(1595360585.617:285): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13160 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:05 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x4, &(0x7f0000000000)=[{0x5df7, 0xf2, 0x3f}, {0x3, 0x3, 0x3, 0x1f}, {0x400, 0x7, 0x6}, {0x400, 0x0, 0x6, 0x8}]})
19:43:05 executing program 3:
19:43:05 executing program 0:
19:43:05 executing program 4:
19:43:05 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
[ 435.690140][T13173] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 435.750323][ T32] audit: type=1326 audit(1595360586.087:286): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13172 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
[ 435.771296][ T32] audit: type=1326 audit(1595360586.087:287): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13193 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:06 executing program 0:
19:43:06 executing program 4:
19:43:06 executing program 3:
19:43:06 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:06 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r4 = dup2(r3, r2)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x1}}, 0x10)
19:43:06 executing program 4:
[ 436.305711][ T32] audit: type=1326 audit(1595360586.637:288): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13208 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:06 executing program 3:
[ 436.492776][ T32] audit: type=1326 audit(1595360586.827:289): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13193 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:07 executing program 0:
19:43:07 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:07 executing program 4:
19:43:07 executing program 3:
19:43:07 executing program 0:
19:43:07 executing program 4:
19:43:07 executing program 3:
[ 437.098632][ T32] audit: type=1326 audit(1595360587.437:290): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13208 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:07 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:07 executing program 0:
19:43:07 executing program 4:
19:43:07 executing program 3:
19:43:07 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ff3000/0xc000)=nil, 0xc000}, &(0x7f0000000140)=0x10)
r2 = socket$inet6(0xa, 0x2, 0x6)
connect$l2tp6(r2, &(0x7f0000000000)={0xa, 0x0, 0x3, @ipv4={[], [], @multicast1}, 0x3ff, 0x1}, 0x20)
r3 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket$netlink(0x10, 0x3, 0x15)
r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00')
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r8 = dup2(r7, r6)
ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
getsockopt$inet6_tcp_buf(r8, 0x6, 0x1f, &(0x7f0000000400)=""/174, &(0x7f00000004c0)=0xae)
sendmsg$DEVLINK_CMD_PORT_SET(r4, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)={0x14, r5, 0x1}, 0x14}}, 0x0)
sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r3, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x188, r5, 0x10, 0x9, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x8}, {0x6, 0x16, 0x20}, {0x5, 0x12, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x4}, {0x6, 0x16, 0xb6}, {0x5, 0x12, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x16, 0x4}, {0x5, 0x12, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0xffff}, {0x5}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x8001}, {0x5}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xffffffb2}, {0x6, 0x16, 0x1ff}, {0x5, 0x12, 0x1}}]}, 0x188}, 0x1, 0x0, 0x0, 0x8041}, 0x4048000)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:43:08 executing program 0:
19:43:08 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:08 executing program 4:
socket$inet_udp(0x2, 0x2, 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x1)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
keyctl$chown(0x4, 0x0, 0x0, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x410, 0x258, 0x5802, 0x294, 0x0, 0x294, 0x340, 0x378, 0x378, 0x340, 0x378, 0x3, 0x0, {[{{@ipv6={@ipv4={[0x98, 0x0, 0xd, 0x0, 0x6c], [], @dev}, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, [], [], 'macvtap0\x00', 'vlan1\x00', {0xff}}, 0x0, 0x230, 0x258, 0x52020000, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'gre0\x00', {0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x7fffffff}}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x0, 0x0, 0x3}}}}, {{@ipv6={@loopback, @mcast2, [], [], 'ip6erspan0\x00', 'sit0\x00', {}, {0xff}}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a2)
19:43:08 executing program 2:
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0)
ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000040)=""/116)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r3 = dup2(r2, r1)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0)
r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00')
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f00000005c0), 0xc, &(0x7f0000000200)={&(0x7f00000013c0)={0x7c, r5, 0x100, 0x70bd27, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5f}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xfe}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40040}, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x50, r5, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1200000}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8b90}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x4044000)
sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xcc, r5, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x4577}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x29}}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x62}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x8}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6, 0x8}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x38}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8000}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4000}, 0x40811)
19:43:08 executing program 3:
[ 437.934665][ T32] audit: type=1326 audit(1595360588.267:291): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13235 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:08 executing program 0:
[ 438.013826][T13243] xt_hashlimit: overflow, try lower: 0/0
[ 438.103595][T13250] xt_hashlimit: overflow, try lower: 0/0
19:43:08 executing program 4:
19:43:08 executing program 3:
19:43:08 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:08 executing program 2:
ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000040)={0x0, 0x1f, 0x5, [], &(0x7f0000000000)=0xc0})
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2000000000000116, &(0x7f0000000080)=[{0xbf78, 0x2, 0x9, 0x770}, {0xa, 0x8, 0x0, 0x4}, {0x7ff, 0x5, 0xfd, 0x5}, {0x7f, 0x7f, 0x9, 0x8}, {0xfff, 0x6, 0xb8, 0x2a}, {0x1f, 0xe2, 0xb8, 0xb8}, {0x9, 0x8, 0x3, 0x6}, {0x1000, 0xff, 0x67, 0x200}]})
r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x400, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@delchain={0x24, 0x2d, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}}, 0x24}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r7 = dup2(r6, r5)
ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r7, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000001c0)=0x4)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'ip6_vti0\x00', r4, 0x2f, 0x2, 0x81, 0x7, 0x4, @dev={0xfe, 0x80, [], 0x3d}, @private0, 0x8000, 0x101359e0122ceafd, 0x5, 0xff4}})
sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001640)={&(0x7f0000000400)={0x120c, 0x12, 0x100, 0x70bd2b, 0x25dfdbfd, {0x2a, 0xff, 0x3, 0xf9, {0x4e22, 0x4e21, [0x8000, 0x3, 0x6, 0x1], [0x81, 0x7, 0x20, 0x5], r8, [0x2, 0x6]}, 0x9083, 0x98ae}, [@INET_DIAG_REQ_BYTECODE={0xe7, 0x1, "d93b89c8bb4059ab87cbae47fb7703d6badd668b7002e1c7169d48e3eed8bf7d7e63a021bd1797b562996fe19e2b684d1b01d4c96bc800aeb7bc634126429986900f58559bda662060b7792ecc7244bb4cce8335a6248e6f1b3f51afe3e0b67db8845fa597cee93b21ad2d48ec779839df6b70ef55360f3fdf889c2adac45c5c4c64db18179f2617a64e95b16fd40a976613bc11cbceaa28aa259199f2cf419fbd5569ef618d6ea1ab109e31f159c6935626d8ff1bd4bf1dc934e21f6a86e0cea16a7f710ca71cf5cc26f06394427de082db0a4c972328b3ec23ab151f84bcd106691f"}, @INET_DIAG_REQ_BYTECODE={0xbb, 0x1, "bcb9640c575a8693dc1da904a2be74d5a2d95e0e5de1a0f34f16f1bb36c8ed17685ecb597bc64c23b40625da6a7b48f57ebb97f2d36079bd113e078b16368c3de3f001b3dd534e352a4eda80f65f7ee342d6ecc8813e926e2650ba8cb173762294876356b88e6ff7a025aa3f3fa31afe98ce197195e6b78d93dcad6cb0485c279670e4f5fee17e1b0849a2e053d670261b7ef38483fcb042ba49aff5e9586a797eaa48203a1c8d68376e083fa5964ffa21b4a6001d94a7"}, @INET_DIAG_REQ_BYTECODE={0xc, 0x1, "5045ba11a25f8a6f"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xb, 0x1, "13305d04345ed3"}]}, 0x120c}, 0x1, 0x0, 0x0, 0x4090}, 0x0)
19:43:08 executing program 0:
[ 438.633062][T13262] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'.
19:43:09 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, 0x0)
pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff})
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133)
r2 = socket(0xa, 0x3, 0x84)
r3 = socket$inet6(0xa, 0x80003, 0x6b)
setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1)
perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c)
splice(r0, 0x0, r2, 0x0, 0x19406, 0x0)
19:43:09 executing program 5:
socket$unix(0x1, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6, 0x0, 0x0, 0x1}]})
[ 438.865027][T13273] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'.
19:43:09 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00')
renameat2(r0, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
19:43:09 executing program 0:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080))
timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
timer_create(0x0, &(0x7f0000000440)={0x0, 0x14}, &(0x7f0000000200)=0x0)
timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
19:43:09 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:09 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r5 = dup2(r4, r3)
ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14)
ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'ip6_vti0\x00', r6, 0x29, 0xf8, 0x62, 0x80000, 0xc, @mcast2, @rand_addr=' \x01\x00', 0x80, 0x10, 0x7, 0x8}})
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
19:43:09 executing program 3:
pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
close(r0)
r1 = socket$xdp(0x2c, 0x3, 0x0)
setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18)
setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4)
setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4)
r2 = socket(0x100000000011, 0x2, 0x0)
bind(r2, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14)
setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4)
bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10)
sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0)
19:43:09 executing program 0:
openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000017c0), 0x1ce, 0x0)
openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0)
19:43:10 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
[ 440.387552][ T32] kauditd_printk_skb: 2 callbacks suppressed
[ 440.387607][ T32] audit: type=1326 audit(1595360590.297:294): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13278 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
[ 440.414453][ T32] audit: type=1326 audit(1595360590.678:295): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13297 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:10 executing program 3:
pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x14)
close(r2)
socket(0x10, 0x3, 0x0)
r3 = socket(0x11, 0x800000003, 0x0)
bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x9)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffff21000000006e2fe0138393", @ANYRES32=r4, @ANYBLOB="00000001f1ffffff000000000800010063627100a40802"], 0x3}}, 0x0)
r5 = socket$inet_udplite(0x2, 0x2, 0x88)
r6 = dup(r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)
19:43:10 executing program 5:
r0 = socket$unix(0x1, 0x0, 0x0)
r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x406, r0)
ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000001180)={0x8, @win={{0x6, 0x0, 0x531, 0x7}, 0x4, 0x4, &(0x7f0000000140)={{0x400, 0x0, 0x5d5a, 0x232}, &(0x7f0000000100)={{0x200000, 0xfff, 0x2, 0xd57}, &(0x7f00000000c0)={{0x800, 0x7, 0x1000, 0x7fffffff}}}}, 0xf417, &(0x7f0000000180)="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", 0x2}})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x20}, {0x0, 0x0, 0x8}, {0x5}]})
19:43:11 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000000)=0x22, 0x4)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
[ 440.677492][T13322] netlink: 2208 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 440.920285][ T32] audit: type=1326 audit(1595360591.258:296): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13325 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:11 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00')
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0})
sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x1c, r1, 0x711, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0)
syz_open_dev$tty20(0xc, 0x4, 0x1)
19:43:11 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r4 = dup2(r3, r2)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$VIDIOC_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @bt={0x7f, 0x9d36, 0x6, 0xffffffff, 0x9, 0x6, 0x2, 0x2}})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:43:11 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
[ 441.214501][ T32] audit: type=1326 audit(1595360591.548:297): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13328 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:11 executing program 0:
openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0)
ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000017c0), 0x1ce, 0x0)
openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0)
19:43:11 executing program 4:
perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14)
ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0x0, 0x0, 0x14, 0x14, 0x0, 0x0, 0x7, 0xb, 0x2, 0xb, 0x3, 0x0, 0x8]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20c200a2, r2})
r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(0xffffffffffffffff, 0x0)
syncfs(r3)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20040081)
fstat(0xffffffffffffffff, &(0x7f0000000080))
write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000100)={0xa0, 0x19, 0x1, {0x1a6, {}, 0x0, 0x0, 0x0, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, 0x0, 0x4, 0x9627, 0xe2, 0xbd1a, 0x2}}, 0xa0)
19:43:11 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:11 executing program 3:
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
[ 441.985043][ T32] audit: type=1326 audit(1595360592.168:298): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13325 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:12 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r4 = dup2(r3, r2)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f00000000c0)={0x3ff, 0x1, 0x1, 'queue1\x00', 0x7})
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:43:12 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$NBD_CLEAR_SOCK(r2, 0xab04)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
19:43:12 executing program 3:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x2, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x1, r0}, 0x38)
syz_open_procfs(0xffffffffffffffff, 0x0)
19:43:12 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000940)=ANY=[@ANYBLOB="9febba031800000000000000300000003000000007000000000000000000000604000000000000000000000201000000000000000100000400"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20)
socket$inet(0x2, 0x0, 0x0)
getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, &(0x7f0000000000))
[ 442.355905][ T32] audit: type=1326 audit(1595360592.688:299): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13362 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:12 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000), 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
[ 442.444230][ T32] audit: type=1326 audit(1595360592.738:300): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13364 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:12 executing program 4:
getpid()
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
r1 = socket$inet6(0xa, 0x2, 0x0)
r2 = dup(r1)
setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x500, 0x360, 0x7000012, 0x10000000, 0x360, 0xc403, 0x430, 0x210, 0x210, 0x430, 0x210, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x338, 0x360, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_macvtap\x00', {0x0, 0xc0, 0x0, 0x0, 0x0, 0x2, 0x401}}}, @common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote, @empty, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, @loopback, @ipv4={[], [], @dev}, @mcast1, @empty, @remote, @empty]}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ipv6={@mcast1, @empty, [], [], 'vlan0\x00', 'bond0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x560)
tkill(r0, 0xb)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
wait4(0x0, 0x0, 0x0, 0x0)
19:43:13 executing program 3:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1)
syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}, 0x0)
[ 442.813631][T13383] xt_TCPMSS: Only works on TCP SYN packets
[ 442.836611][T13384] ptrace attach of "/root/syz-executor.4"[13383] was attempted by "/root/syz-executor.4"[13384]
19:43:13 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff})
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = dup2(r1, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[], 0x10132)
recvmmsg(r4, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x2, 0x0)
[ 442.955786][T13387] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables
[ 443.231582][ T32] audit: type=1326 audit(1595360593.568:301): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13364 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:13 executing program 0:
syz_open_dev$tty1(0xc, 0x4, 0x1)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x410, 0x258, 0x5802, 0x294, 0x0, 0x294, 0x340, 0x378, 0x378, 0x340, 0x378, 0x3, 0x0, {[{{@ipv6={@ipv4={[0x98, 0x0, 0xd, 0x0, 0x6c], [], @dev}, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, [], [], 'macvtap0\x00', 'vlan1\x00', {0xff}, {}, 0x5c}, 0x0, 0x230, 0x258, 0x52020000, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'gre0\x00', {0x0, 0x5, 0x50, 0x0, 0x0, 0x1, 0x7fffffff}}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x0, 0x0, 0x3}}}}, {{@ipv6={@loopback, @mcast2, [], [0x0, 0x0, 0xffffff00], 'ip6erspan0\x00', 'sit0\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a2)
19:43:13 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000), 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:13 executing program 5:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x24000, 0x0)
ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000000c0)=0x8)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6, 0x0, 0x0, 0x4}]})
19:43:13 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080))
[ 443.555032][T13400] Cannot find add_set index 0 as target
[ 443.728596][T13409] Cannot find add_set index 0 as target
[ 443.782081][ T32] audit: type=1326 audit(1595360594.118:302): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13406 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:14 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000), 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:14 executing program 0:
perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x3, 0x1)
close(r0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(r1, 0x208200)
r2 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
sendfile(r0, r2, 0x0, 0x8000fffffffe)
19:43:14 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x1, 0x0, 0x7f, 0x7}, {0x2, 0x8, 0x5, 0x7}, {0x5, 0x8, 0x5, 0x800}, {0x8, 0x0, 0x4}, {0x4, 0x0, 0x99, 0x6eee}]})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x8)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r5 = dup2(r4, r3)
ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)={r5})
setsockopt$CAIFSO_LINK_SELECT(r6, 0x116, 0x7f, &(0x7f00000000c0)=0x5, 0x4)
19:43:14 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000940)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000060400000000000000000000020100000000000000010000040000000200000000020000000b000000003000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x8c, "4a4b5380106c548625a8440b396826705ea9b9dfc7b71b6add98804213df08ebec74c621b30bc7cb1e740643614b8d860d4571daca68b4c2b198ee4b58aad0a00fce686efc9c42a2b1ba99f7e2930d3dcc048bed8d577fec4b0f58a801a9bf70be2c0e103130e164b3f01c14d9291c3243155260467d30740c5d1fa7ced1e09dcec13a6b2e34aff1cf165b55"}, &(0x7f0000000000)=0xb0)
19:43:14 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000200)='./bus\x00', 0x151042, 0x0)
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0)
bind$netlink(0xffffffffffffffff, 0x0, 0x0)
sendfile(r0, r1, 0x0, 0x4000000000010046)
19:43:15 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:43:18 executing program 4:
perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20)
19:43:18 executing program 3:
perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_getparam(0x0, &(0x7f0000000040))
19:43:18 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r4 = dup2(r3, r2)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$IOC_PR_RELEASE(r4, 0x401070ca, &(0x7f0000000000)={0x9, 0x2})
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:43:18 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:43:18 executing program 0:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000180)=""/4082, 0xff2}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/unix\x00')
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
preadv(r0, &(0x7f00000017c0), 0x218, 0x0)
19:43:18 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
connect$tipc(r2, &(0x7f0000000140)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x3}}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r5 = dup2(r4, r3)
ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
r6 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r6, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10)
r7 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000080)={r8, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000000)=0x9c)
getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000000)={r8, 0x100, 0x4, 0x4}, &(0x7f00000000c0)=0x10)
[ 448.317142][ T32] audit: type=1326 audit(1595360598.648:303): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13448 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:18 executing program 3:
perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0)
[ 448.435584][ T32] audit: type=1326 audit(1595360598.768:304): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13458 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:18 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_IP_TARGET={0x4}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x40}}, 0x0)
19:43:19 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(r3, &(0x7f0000000340)={0x11, 0x0, r4}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:43:19 executing program 0:
syz_emit_ethernet(0x36, &(0x7f0000000080)=ANY=[], 0x0)
[ 448.845512][T13468] (unnamed net_device) (uninitialized): Unable to set down delay as MII monitoring is disabled
19:43:19 executing program 3:
pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x14)
close(r2)
socket(0x10, 0x3, 0x0)
r3 = socket(0x11, 0x800000003, 0x0)
bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x9)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffff21000000006e2fe0138393", @ANYRES32=r4, @ANYBLOB="00000001f1ffffff0000000008000100636271"], 0x3}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)
19:43:19 executing program 4:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90)
fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1})
r3 = open(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0)
ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000340)=ANY=[])
[ 449.221311][ T32] audit: type=1326 audit(1595360599.558:305): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13458 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
[ 449.327443][T13483] netlink: 2212 bytes leftover after parsing attributes in process `syz-executor.3'.
19:43:19 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6, 0x0, 0x13}]})
r0 = gettid()
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x9, r0, 0x0, 0x0)
fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000100)={0x2, 0x0, 0x9f49, 0x5, r0})
r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/route\x00')
setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0)=0x3, 0x4)
19:43:19 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0})
setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, r1/1000+10000}, 0x10)
listen(r0, 0x0)
accept4(r0, 0x0, 0x0, 0x0)
shutdown(r0, 0x1)
19:43:19 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0)
bind$packet(r3, &(0x7f0000000340), 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:43:19 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)})
19:43:19 executing program 4:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080))
timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0)
timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0)
socket(0x0, 0x0, 0x0)
poll(0x0, 0x0, 0x204)
syz_genetlink_get_family_id$nbd(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0)
sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0xc0040)
r1 = msgget$private(0x0, 0x0)
msgrcv(r1, 0x0, 0x0, 0x0, 0x0)
[ 449.783654][ T32] audit: type=1326 audit(1595360600.118:306): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13497 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:20 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2000000000000091, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
19:43:20 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0)
bind$packet(r3, &(0x7f0000000340), 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:43:20 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x2, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="4800000010000547000000edffffffffffffff00", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0)
sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000090001006866736300fdff00080002"], 0x38}}, 0x0)
sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x38, 0x2, [@TCA_BASIC_EMATCHES={0x34, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x805}}, @TCA_EMATCH_TREE_LIST={0x28, 0x2, 0x0, 0x1, [@TCF_EM_META={0x24, 0x1, 0x0, 0x0, {{0x0, 0x5}, [@TCA_EM_META_LVALUE={0x15, 0x2, [@TCF_META_TYPE_VAR="24f1a78029", @TCF_META_TYPE_INT, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT]}]}}]}]}]}}]}, 0x68}}, 0x0)
19:43:20 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r4 = dup2(r3, r2)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
ioctl$CHAR_RAW_BSZGET(r4, 0x80081270, &(0x7f0000000000))
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
[ 450.477849][T13515] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 450.544937][ T32] audit: type=1326 audit(1595360600.878:307): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13497 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:21 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0)
bind$packet(r3, &(0x7f0000000340), 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:43:21 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x3)
[ 450.671071][ T32] audit: type=1326 audit(1595360600.938:308): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13516 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:21 executing program 4:
perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
pwrite64(r0, &(0x7f0000000000)="b5", 0x1, 0x0)
fcntl$setstatus(r0, 0x4, 0x46802)
io_setup(0x2e, &(0x7f0000000400)=0x0)
io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000180)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000240)='b', 0x1}])
[ 450.716101][T13522] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'.
19:43:21 executing program 3:
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x220, 0x0, 0x5002004a, 0x0, 0x0, 0x0, 0x188, 0x3c8, 0x3c8, 0x188, 0x3c8, 0x3, 0x0, {[{{@ip={@private, @empty, 0x0, 0x0, 'vlan0\x00', 'gretap0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x6], 0x0, 0xb8, 0xd8, 0x0, {}, [@common=@unspec=@helper={{0x48, 'helper\x00'}, {0x0, 'sane-20000\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280)
19:43:21 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
r0 = gettid()
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x9, r0, 0x0, 0x0)
fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000100)={0x2, 0x0, 0x9f49, 0x5, r0})
r1 = gettid()
ptrace$setopts(0x4206, r1, 0x0, 0x0)
ptrace$cont(0x9, r1, 0x0, 0x0)
r2 = gettid()
ptrace$setopts(0x4206, r2, 0x0, 0x0)
ptrace$cont(0x9, r2, 0x0, 0x0)
fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000100)={0x2, 0x0, 0x9f49, 0x5, r2})
r3 = gettid()
ptrace$setopts(0x4206, r3, 0x0, 0x0)
ptrace$cont(0x9, r3, 0x0, 0x0)
fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000100)={0x2, 0x0, 0x9f49, 0x5, r3})
tgkill(r2, r3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000100)={0x2, 0x0, 0x9f49, 0x5, r1})
rt_tgsigqueueinfo(r0, r1, 0x28, &(0x7f00000000c0)={0x13, 0x1ff, 0x101})
19:43:21 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0x3)
ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x80})
ioctl$KVM_SET_CPUID(r2, 0xae80, 0x0)
19:43:21 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
[ 451.275996][ T32] audit: type=1326 audit(1595360601.608:309): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13542 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:21 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0xffffffff, 0x3d8, 0x258, 0x5802, 0x294, 0x0, 0x294, 0x340, 0x378, 0x378, 0x340, 0x378, 0x3, 0x0, {[{{@ipv6={@ipv4={[0x98, 0x0, 0xd, 0x0, 0x6c], [], @dev}, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, [], [], 'macvtap0\x00', 'vlan1\x00'}, 0x0, 0x1f8, 0x220, 0x52020000, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'gre0\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@loopback, @mcast2, [], [], 'ip6erspan0\x00', 'sit0\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438)
19:43:21 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48)
19:43:21 executing program 0:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000080)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000f9e0a264df0f01c166ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x69}], 0x1, 0x0, 0x0, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb]})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)
19:43:22 executing program 3:
fanotify_init(0x10, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00')
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
sendfile(r1, r0, 0x0, 0x209)
19:43:22 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
19:43:22 executing program 5:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15}, {}, {0x6}]})
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000017c0)='TIPC\x00')
sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001840)={&(0x7f0000000380)={0x38, r4, 0x507, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x400, 0x0, @l2={'ib', 0x3a, 'bond_slave_0\x00'}}}}}, 0x38}}, 0x0)
sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x100, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40001}, 0x0)
19:43:22 executing program 4:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080))
timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0)
timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0)
socket(0x0, 0x0, 0x0)
poll(0x0, 0x0, 0x204)
msgrcv(0x0, 0x0, 0x0, 0x0, 0x0)
[ 451.964700][ T32] audit: type=1326 audit(1595360602.298:310): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13575 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
[ 452.034082][T13582] tipc: Failed to obtain node identity
[ 452.039869][T13582] tipc: Enabling of bearer rejected, failed to enable media
[ 452.056084][ T32] audit: type=1326 audit(1595360602.388:311): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13542 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f03a code=0x0
19:43:22 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000180)=""/4082, 0xff2}], 0x1, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw6\x00')
preadv(r0, &(0x7f00000017c0), 0x218, 0x0)
19:43:22 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00', 0x0})
bind$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, r5}, 0x14)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r6}, 0x80, 0x0}}], 0x1, 0x0)
[ 452.365175][ C1] not chained 20000 origins
[ 452.366243][ C1] CPU: 1 PID: 802 Comm: kworker/u4:14 Not tainted 5.8.0-rc5-syzkaller #0
[ 452.376907][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 452.376907][ C1] Workqueue: krdsd rds_connect_worker
[ 452.376907][ C1] Call Trace:
[ 452.376907][ C1]
[ 452.376907][ C1] dump_stack+0x1df/0x240
[ 452.376907][ C1] kmsan_internal_chain_origin+0x6f/0x130
[ 452.376907][ C1] ? should_fail+0x72/0x9e0
[ 452.411092][ C1] ? ret_from_fork+0x22/0x30
[ 452.411092][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20
[ 452.411092][ C1] ? arch_stack_walk+0x34c/0x3e0
[ 452.411092][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 452.411092][ C1] ? __should_failslab+0x1f6/0x290
[ 452.411092][ C1] ? kmsan_get_metadata+0x4f/0x180
[ 452.411092][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 452.411092][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20
[ 452.411092][ C1] ? tcp_parse_options+0x1ada/0x1b90
[ 452.411092][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 452.411092][ C1] __msan_chain_origin+0x50/0x90
[ 452.411092][ C1] tcp_conn_request+0x1781/0x4d10
[ 452.411092][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20
[ 452.411092][ C1] ? cache_from_obj+0x3d5/0x6b0
[ 452.411092][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 452.411092][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 452.411092][ C1] tcp_v4_conn_request+0x19b/0x240
[ 452.411092][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 452.411092][ C1] ? inet6_sk_rx_dst_set+0x400/0x400
[ 452.411092][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 452.411092][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 452.411092][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 452.411092][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 452.411092][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 452.411092][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 452.411092][ C1] tcp_v4_rcv+0x425c/0x5040
[ 452.411092][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20
[ 452.411092][ C1] ? tcp_filter+0xf0/0xf0
[ 452.411092][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 452.411092][ C1] ip_local_deliver+0x62a/0x7c0
[ 452.411092][ C1] ? ip_local_deliver+0x7c0/0x7c0
[ 452.411092][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0
[ 452.411092][ C1] ip_rcv+0x6cf/0x750
[ 452.411092][ C1] ? ip_rcv_core+0x12c0/0x12c0
[ 452.411092][ C1] ? ip_local_deliver_finish+0x350/0x350
[ 452.411092][ C1] process_backlog+0xfb5/0x14e0
[ 452.411092][ C1] ? lapic_next_event+0x6e/0xa0
[ 452.411092][ C1] ? rps_trigger_softirq+0x2e0/0x2e0
[ 452.411092][ C1] net_rx_action+0x746/0x1aa0
[ 452.411092][ C1] ? net_tx_action+0xc40/0xc40
[ 452.411092][ C1] __do_softirq+0x311/0x83d
[ 452.411092][ C1] asm_call_on_stack+0x12/0x20
[ 452.411092][ C1]
[ 452.411092][ C1] do_softirq_own_stack+0x7c/0xa0
[ 452.411092][ C1] __local_bh_enable_ip+0x184/0x1d0
[ 452.411092][ C1] local_bh_enable+0x36/0x40
[ 452.411092][ C1] ip_finish_output2+0x1fee/0x24a0
[ 452.411092][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0
[ 452.411092][ C1] __ip_finish_output+0xaa7/0xd80
[ 452.411092][ C1] ip_finish_output+0x166/0x410
[ 452.411092][ C1] ip_output+0x593/0x680
[ 452.411092][ C1] ? ip_mc_finish_output+0x6c0/0x6c0
[ 452.411092][ C1] ? ip_finish_output+0x410/0x410
[ 452.411092][ C1] __ip_queue_xmit+0x1b5c/0x21a0
[ 452.411092][ C1] ? kmsan_set_origin_checked+0x95/0xf0
[ 452.411092][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 452.411092][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 452.411092][ C1] ip_queue_xmit+0xcc/0xf0
[ 452.411092][ C1] ? tcp_v4_fill_cb+0x580/0x580
[ 452.411092][ C1] __tcp_transmit_skb+0x440e/0x6090
[ 452.411092][ C1] tcp_connect+0x4208/0x6830
[ 452.411092][ C1] ? __msan_poison_alloca+0xf0/0x120
[ 452.411092][ C1] tcp_v4_connect+0x21fd/0x2370
[ 452.411092][ C1] ? tcp_twsk_unique+0xba0/0xba0
[ 452.411092][ C1] __inet_stream_connect+0x2fb/0x1340
[ 452.411092][ C1] ? __local_bh_enable_ip+0x97/0x1d0
[ 452.411092][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 452.411092][ C1] inet_stream_connect+0x101/0x180
[ 452.411092][ C1] ? __inet_stream_connect+0x1340/0x1340
[ 452.411092][ C1] rds_tcp_conn_path_connect+0x8a7/0xb70
[ 452.411092][ C1] ? kmsan_get_metadata+0x11d/0x180
[ 452.411092][ C1] ? rds_tcp_state_change+0x390/0x390
[ 452.411092][ C1] rds_connect_worker+0x2a6/0x470
[ 452.411092][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20
[ 452.411092][ C1] ? rds_addr_cmp+0x200/0x200
[ 452.411092][ C1] process_one_work+0x1540/0x1f30
[ 452.411092][ C1] worker_thread+0xed2/0x23f0
[ 452.411092][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[ 452.411092][ C1] kthread+0x515/0x550
[ 452.411092][ C1] ? process_one_work+0x1f30/0x1f30
[ 452.411092][ C1] ? kthread_blkcg+0xf0/0xf0
[ 452.411092][ C1] ret_from_fork+0x22/0x30
[ 452.411092][ C1] Uninit was stored to memory at:
[ 452.411092][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 452.411092][ C1] __msan_chain_origin+0x50/0x90
[ 452.411092][ C1] tcp_conn_request+0x1781/0x4d10
[ 452.411092][ C1] tcp_v4_conn_request+0x19b/0x240
[ 452.411092][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 452.411092][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 452.411092][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 452.411092][ C1] tcp_v4_rcv+0x425c/0x5040
[ 452.411092][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 452.411092][ C1] ip_local_deliver+0x62a/0x7c0
[ 452.411092][ C1] ip_rcv+0x6cf/0x750
[ 452.411092][ C1] process_backlog+0xfb5/0x14e0
[ 452.411092][ C1] net_rx_action+0x746/0x1aa0
[ 452.411092][ C1] __do_softirq+0x311/0x83d
[ 452.411092][ C1]
[ 452.411092][ C1] Uninit was stored to memory at:
[ 452.411092][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 452.411092][ C1] __msan_chain_origin+0x50/0x90
[ 452.411092][ C1] tcp_openreq_init_rwin+0xc21/0xc80
[ 452.411092][ C1] tcp_conn_request+0x33d7/0x4d10
[ 452.411092][ C1] tcp_v4_conn_request+0x19b/0x240
[ 452.411092][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 452.411092][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 452.411092][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 452.411092][ C1] tcp_v4_rcv+0x425c/0x5040
[ 452.411092][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 452.411092][ C1] ip_local_deliver+0x62a/0x7c0
[ 452.411092][ C1] ip_rcv+0x6cf/0x750
[ 452.411092][ C1] process_backlog+0xfb5/0x14e0
[ 452.411092][ C1] net_rx_action+0x746/0x1aa0
[ 452.411092][ C1] __do_softirq+0x311/0x83d
[ 452.411092][ C1]
[ 452.411092][ C1] Uninit was stored to memory at:
[ 452.411092][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 452.411092][ C1] __msan_chain_origin+0x50/0x90
[ 452.411092][ C1] tcp_conn_request+0x1781/0x4d10
[ 452.411092][ C1] tcp_v4_conn_request+0x19b/0x240
[ 452.411092][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 452.411092][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 452.411092][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 452.411092][ C1] tcp_v4_rcv+0x425c/0x5040
[ 452.411092][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 452.411092][ C1] ip_local_deliver+0x62a/0x7c0
[ 452.411092][ C1] ip_rcv+0x6cf/0x750
[ 452.411092][ C1] process_backlog+0xfb5/0x14e0
[ 452.411092][ C1] net_rx_action+0x746/0x1aa0
[ 452.411092][ C1] __do_softirq+0x311/0x83d
[ 452.411092][ C1]
[ 452.411092][ C1] Uninit was stored to memory at:
[ 452.411092][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 452.411092][ C1] __msan_chain_origin+0x50/0x90
[ 452.411092][ C1] tcp_openreq_init_rwin+0xc21/0xc80
[ 452.411092][ C1] tcp_conn_request+0x33d7/0x4d10
[ 452.411092][ C1] tcp_v4_conn_request+0x19b/0x240
[ 452.411092][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 452.411092][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 452.411092][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 452.411092][ C1] tcp_v4_rcv+0x425c/0x5040
[ 452.411092][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 452.411092][ C1] ip_local_deliver+0x62a/0x7c0
[ 452.411092][ C1] ip_rcv+0x6cf/0x750
[ 452.411092][ C1] process_backlog+0xfb5/0x14e0
[ 452.411092][ C1] net_rx_action+0x746/0x1aa0
[ 452.411092][ C1] __do_softirq+0x311/0x83d
[ 452.411092][ C1]
[ 452.411092][ C1] Uninit was stored to memory at:
[ 452.411092][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 452.411092][ C1] __msan_chain_origin+0x50/0x90
[ 452.411092][ C1] tcp_conn_request+0x1781/0x4d10
[ 452.411092][ C1] tcp_v4_conn_request+0x19b/0x240
[ 452.411092][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 452.411092][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 452.411092][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 452.411092][ C1] tcp_v4_rcv+0x425c/0x5040
[ 452.411092][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 452.411092][ C1] ip_local_deliver+0x62a/0x7c0
[ 452.411092][ C1] ip_rcv+0x6cf/0x750
[ 452.411092][ C1] process_backlog+0xfb5/0x14e0
[ 452.411092][ C1] net_rx_action+0x746/0x1aa0
[ 452.411092][ C1] __do_softirq+0x311/0x83d
[ 452.411092][ C1]
[ 452.411092][ C1] Uninit was stored to memory at:
[ 452.411092][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 452.411092][ C1] __msan_chain_origin+0x50/0x90
[ 452.411092][ C1] tcp_openreq_init_rwin+0xc21/0xc80
[ 452.411092][ C1] tcp_conn_request+0x33d7/0x4d10
[ 452.411092][ C1] tcp_v4_conn_request+0x19b/0x240
[ 452.411092][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 452.411092][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 452.411092][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 452.411092][ C1] tcp_v4_rcv+0x425c/0x5040
[ 452.411092][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 452.411092][ C1] ip_local_deliver+0x62a/0x7c0
[ 452.411092][ C1] ip_rcv+0x6cf/0x750
[ 452.411092][ C1] process_backlog+0xfb5/0x14e0
[ 452.411092][ C1] net_rx_action+0x746/0x1aa0
[ 452.411092][ C1] __do_softirq+0x311/0x83d
[ 452.411092][ C1]
[ 452.411092][ C1] Uninit was stored to memory at:
[ 452.411092][ C1] kmsan_internal_chain_origin+0xad/0x130
[ 452.411092][ C1] __msan_chain_origin+0x50/0x90
[ 452.411092][ C1] tcp_conn_request+0x1781/0x4d10
[ 452.411092][ C1] tcp_v4_conn_request+0x19b/0x240
[ 452.411092][ C1] tcp_v6_conn_request+0xb5/0x2d0
[ 452.411092][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 452.411092][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 452.411092][ C1] tcp_v4_rcv+0x425c/0x5040
[ 452.411092][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 452.411092][ C1] ip_local_deliver+0x62a/0x7c0
[ 452.411092][ C1] ip_rcv+0x6cf/0x750
[ 452.411092][ C1] process_backlog+0xfb5/0x14e0
[ 452.411092][ C1] net_rx_action+0x746/0x1aa0
[ 452.411092][ C1] __do_softirq+0x311/0x83d
[ 452.411092][ C1]
[ 452.411092][ C1] Uninit was created at:
[ 452.411092][ C1] kmsan_save_stack_with_flags+0x3c/0x90
[ 452.411092][ C1] kmsan_alloc_page+0xb9/0x180
[ 452.411092][ C1] __alloc_pages_nodemask+0x56a2/0x5dc0
[ 452.411092][ C1] alloc_pages_current+0x672/0x990
[ 452.411092][ C1] alloc_slab_page+0x122/0x1300
[ 452.411092][ C1] new_slab+0x2bc/0x1130
[ 452.411092][ C1] ___slab_alloc+0x14a3/0x2040
[ 452.411092][ C1] kmem_cache_alloc+0xb23/0xd70
[ 452.411092][ C1] inet_reqsk_alloc+0xac/0x830
[ 452.411092][ C1] tcp_conn_request+0x753/0x4d10
[ 452.411092][ C1] tcp_v4_conn_request+0x19b/0x240
[ 452.411092][ C1] tcp_rcv_state_process+0x26b/0x71c0
[ 452.411092][ C1] tcp_v4_do_rcv+0xb0f/0xd70
[ 452.411092][ C1] tcp_v4_rcv+0x425c/0x5040
[ 452.411092][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0
[ 452.411092][ C1] ip_local_deliver+0x62a/0x7c0
[ 452.411092][ C1] ip_sublist_rcv+0x125d/0x1450
19:43:23 executing program 2:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {}, {0x6}]})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'})
getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x42}, 0x4, 0x2, 0x0, 0x1, 0x2}, &(0x7f00000000c0)=0x20)
[ 452.411092][ C1] ip_list_rcv+0x904/0x970
[ 452.411092][ C1] __netif_receive_skb_list_core+0x1459/0x14d0
[ 452.411092][ C1] netif_receive_skb_list_internal+0xf66/0x1610
[ 452.411092][ C1] napi_complete_done+0x439/0xe10
[ 452.411092][ C1] virtqueue_napi_complete+0xb9/0x1f0
[ 452.411092][ C1] virtnet_poll+0x1468/0x19f0
[ 452.411092][ C1] net_rx_action+0x746/0x1aa0
[ 452.411092][ C1] __do_softirq+0x311/0x83d
[ 453.559425][T13587] tipc: Failed to obtain node identity
[ 453.565035][T13587] tipc: Enabling of bearer rejected, failed to enable media
19:43:24 executing program 3:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x2, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x1, r0}, 0x38)
19:43:24 executing program 4:
r0 = getpid()
sched_setscheduler(r0, 0x0, &(0x7f0000000380))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000080)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000f9e0a264df0f01c166ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x69}], 0x1, 0x0, 0x0, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb]})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)
19:43:24 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan0\x00'})
bind$packet(r3, 0x0, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f)
sendmmsg(r2, &(0x7f0000006640)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0)
19:43:24 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000940)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000060400000000000000000000020100000000000000010000040000000200000000020000000b000000003000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20)
socket$inet(0x2, 0x0, 0x0)
getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, &(0x7f0000000000))
19:43:26 executing program 0:
syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x410, 0x258, 0x5802, 0x294, 0x0, 0x294, 0x340, 0x378, 0x378, 0x340, 0x378, 0x3, 0x0, {[{{@ipv6={@ipv4={[0x98, 0x0, 0xd, 0x0, 0x6c], [], @dev}, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, [], [], 'macvtap0\x00', 'vlan1\x00', {}, {}, 0x5c}, 0x0, 0x230, 0x258, 0x52020000, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'gre0\x00', {0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x7fffffff}}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@loopback, @mcast2, [], [], 'ip6erspan0\x00', 'sit0\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a2)
19:43:26 executing program 4:
pipe(&(0x7f0000000280)={0xffffffffffffffff,