0f/0xd70 [ 1361.331624][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1361.336120][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1361.341579][ C1] ip_local_deliver+0x62a/0x7c0 [ 1361.346428][ C1] ip_rcv+0x6cf/0x750 [ 1361.350404][ C1] process_backlog+0xfb5/0x14e0 [ 1361.355247][ C1] net_rx_action+0x746/0x1aa0 [ 1361.359918][ C1] __do_softirq+0x311/0x83d [ 1361.364397][ C1] [ 1361.366737][ C1] Uninit was stored to memory at: [ 1361.371769][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1361.377498][ C1] __msan_chain_origin+0x50/0x90 [ 1361.382415][ C1] tcp_conn_request+0x1781/0x4d10 [ 1361.387428][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1361.392545][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1361.397571][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1361.402949][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1361.407570][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1361.412081][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1361.417541][ C1] ip_local_deliver+0x62a/0x7c0 [ 1361.422390][ C1] ip_rcv+0x6cf/0x750 [ 1361.426372][ C1] process_backlog+0xfb5/0x14e0 [ 1361.431250][ C1] net_rx_action+0x746/0x1aa0 [ 1361.435939][ C1] __do_softirq+0x311/0x83d [ 1361.440456][ C1] [ 1361.442796][ C1] Uninit was created at: [ 1361.447105][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 1361.452765][ C1] kmsan_alloc_page+0xb9/0x180 [ 1361.457531][ C1] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1361.463082][ C1] alloc_pages_current+0x672/0x990 [ 1361.468196][ C1] alloc_slab_page+0x122/0x1300 [ 1361.473042][ C1] new_slab+0x2bc/0x1130 [ 1361.477287][ C1] ___slab_alloc+0x14a3/0x2040 [ 1361.482050][ C1] kmem_cache_alloc+0xb23/0xd70 [ 1361.486908][ C1] inet_reqsk_alloc+0xac/0x830 [ 1361.491675][ C1] tcp_conn_request+0x753/0x4d10 [ 1361.496620][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1361.501740][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1361.507129][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1361.511732][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1361.516242][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1361.521705][ C1] ip_local_deliver+0x62a/0x7c0 [ 1361.526622][ C1] ip_sublist_rcv+0x125d/0x1450 [ 1361.531494][ C1] ip_list_rcv+0x904/0x970 [ 1361.535919][ C1] __netif_receive_skb_list_core+0x1459/0x14d0 05:57:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:00 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {0x0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:00 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "6b1c684768fe3c0bf00b7f12eb8cfd0bfec2f11ecb8f87e8de5c105acb219b0a8f4c111ad53620401ca12d736070919840b5ecabc5a429b3dc5c20de3fb410cde8a13006dc3e93af9591159c84c14ee01cb99631bdf5dc42710e08999b7d93ef594127b64413346ecedcc81a268e2313067efc9bda524ddf6a39a5ffd23a0e21e0366a63c542355e163f03f6d27c2e07658e66e42f8a9019ce4130c19573a9415655dd191eec46db7883953e6be05f469ce9681a7e481fe4e4fb032e2615163a5d4d6359af209f71303a43dabde1244263287658201f2649380743761fab7649248164d6f78051323c6a6cd1b68d8d3e3d95ae699568bb02124e0149e9a89a23"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f4656211118", 0x21) 05:57:00 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1361.542086][ C1] netif_receive_skb_list_internal+0xf66/0x1610 [ 1361.548340][ C1] napi_complete_done+0x439/0xe10 [ 1361.553373][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 1361.558752][ C1] virtnet_poll+0x1468/0x19f0 [ 1361.563431][ C1] net_rx_action+0x746/0x1aa0 [ 1361.568113][ C1] __do_softirq+0x311/0x83d 05:57:01 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:01 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "6b1c684768fe3c0bf00b7f12eb8cfd0bfec2f11ecb8f87e8de5c105acb219b0a8f4c111ad53620401ca12d736070919840b5ecabc5a429b3dc5c20de3fb410cde8a13006dc3e93af9591159c84c14ee01cb99631bdf5dc42710e08999b7d93ef594127b64413346ecedcc81a268e2313067efc9bda524ddf6a39a5ffd23a0e21e0366a63c542355e163f03f6d27c2e07658e66e42f8a9019ce4130c19573a9415655dd191eec46db7883953e6be05f469ce9681a7e481fe4e4fb032e2615163a5d4d6359af209f71303a43dabde1244263287658201f2649380743761fab7649248164d6f78051323c6a6cd1b68d8d3e3d95ae699568bb02124e0149e9a89a23"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:01 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f4656211118", 0x21) 05:57:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:01 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "6b1c684768fe3c0bf00b7f12eb8cfd0bfec2f11ecb8f87e8de5c105acb219b0a8f4c111ad53620401ca12d736070919840b5ecabc5a429b3dc5c20de3fb410cde8a13006dc3e93af9591159c84c14ee01cb99631bdf5dc42710e08999b7d93ef594127b64413346ecedcc81a268e2313067efc9bda524ddf6a39a5ffd23a0e21e0366a63c542355e163f03f6d27c2e07658e66e42f8a9019ce4130c19573a9415655dd191eec46db7883953e6be05f469ce9681a7e481fe4e4fb032e2615163a5d4d6359af209f71303a43dabde1244263287658201f2649380743761fab7649248164d6f78051323c6a6cd1b68d8d3e3d95ae699568bb02124e0149e9a89a23"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:04 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f4656211118", 0x21) [ 1364.999210][T27488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:57:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:04 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1365.546963][T27505] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:57:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:07 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1368.208842][T27528] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 05:57:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:07 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1368.758024][T27541] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) [ 1368.850325][T27541] device dummy0 entered promiscuous mode [ 1368.918557][T27541] device dummy0 left promiscuous mode 05:57:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 05:57:10 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1371.301925][T27566] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1371.392786][T27566] device dummy0 entered promiscuous mode [ 1371.449517][T27566] device dummy0 left promiscuous mode 05:57:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14", 0x11) 05:57:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14", 0x11) [ 1372.027393][ C1] not chained 500000 origins [ 1372.032063][ C1] CPU: 1 PID: 24158 Comm: kworker/u4:27 Not tainted 5.8.0-rc5-syzkaller #0 [ 1372.040885][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1372.051388][ C1] Workqueue: krdsd rds_connect_worker [ 1372.056778][ C1] Call Trace: [ 1372.060104][ C1] [ 1372.063304][ C1] dump_stack+0x1df/0x240 [ 1372.067668][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 1372.073413][ C1] ? should_fail+0x72/0x9e0 [ 1372.077945][ C1] ? ret_from_fork+0x22/0x30 [ 1372.082655][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1372.088924][ C1] ? arch_stack_walk+0x34c/0x3e0 [ 1372.093988][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1372.099565][ C1] ? __should_failslab+0x1f6/0x290 [ 1372.104716][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 1372.110058][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1372.115892][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 1372.122245][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 1372.127797][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1372.133028][ C1] __msan_chain_origin+0x50/0x90 [ 1372.138001][ C1] tcp_conn_request+0x1781/0x4d10 [ 1372.143103][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1372.148329][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1372.154173][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1372.159679][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1372.164959][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1372.170023][ C1] ? inet6_sk_rx_dst_set+0x400/0x400 [ 1372.175345][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1372.180858][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1372.186091][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1372.191932][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1372.198139][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1372.203553][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1372.208287][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1372.212961][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 1372.219223][ C1] ? tcp_filter+0xf0/0xf0 05:57:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14", 0x11) [ 1372.223598][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1372.229192][ C1] ip_local_deliver+0x62a/0x7c0 [ 1372.234107][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 1372.239216][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 1372.244971][ C1] ip_rcv+0x6cf/0x750 [ 1372.249001][ C1] ? ip_rcv_core+0x12c0/0x12c0 [ 1372.253793][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 1372.259461][ C1] process_backlog+0xfb5/0x14e0 [ 1372.264360][ C1] ? lapic_next_event+0x6e/0xa0 [ 1372.269272][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 1372.274585][ C1] net_rx_action+0x746/0x1aa0 [ 1372.279411][ C1] ? net_tx_action+0xc40/0xc40 [ 1372.284208][ C1] __do_softirq+0x311/0x83d [ 1372.288786][ C1] asm_call_on_stack+0x12/0x20 [ 1372.293568][ C1] [ 1372.296544][ C1] do_softirq_own_stack+0x7c/0xa0 [ 1372.301622][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 1372.306899][ C1] local_bh_enable+0x36/0x40 [ 1372.311522][ C1] ip_finish_output2+0x1fee/0x24a0 [ 1372.316668][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 1372.322936][ C1] __ip_finish_output+0xaa7/0xd80 [ 1372.328088][ C1] ip_finish_output+0x166/0x410 [ 1372.333052][ C1] ip_output+0x593/0x680 [ 1372.337436][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 1372.342853][ C1] ? ip_finish_output+0x410/0x410 [ 1372.347920][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 1372.352901][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 1372.358582][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1372.363842][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1372.369089][ C1] ip_queue_xmit+0xcc/0xf0 [ 1372.373645][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 1372.378683][ C1] __tcp_transmit_skb+0x440e/0x6090 [ 1372.384120][ C1] tcp_connect+0x4208/0x6830 [ 1372.388759][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 1372.394209][ C1] tcp_v4_connect+0x21fd/0x2370 [ 1372.399228][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 1372.404572][ C1] __inet_stream_connect+0x2fb/0x1340 [ 1372.410085][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 1372.415926][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1372.421173][ C1] inet_stream_connect+0x101/0x180 [ 1372.426340][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 1372.432011][ C1] rds_tcp_conn_path_connect+0x8a7/0xb70 [ 1372.437697][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1372.443114][ C1] ? rds_tcp_state_change+0x390/0x390 [ 1372.448666][ C1] rds_connect_worker+0x2a6/0x470 [ 1372.453725][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1372.459830][ C1] ? rds_addr_cmp+0x200/0x200 [ 1372.464528][ C1] process_one_work+0x1540/0x1f30 [ 1372.469610][ C1] worker_thread+0xed2/0x23f0 [ 1372.474318][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1372.480172][ C1] kthread+0x515/0x550 [ 1372.484265][ C1] ? process_one_work+0x1f30/0x1f30 [ 1372.489488][ C1] ? kthread_blkcg+0xf0/0xf0 [ 1372.494104][ C1] ret_from_fork+0x22/0x30 [ 1372.498551][ C1] Uninit was stored to memory at: [ 1372.503598][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1372.509342][ C1] __msan_chain_origin+0x50/0x90 [ 1372.514309][ C1] tcp_conn_request+0x1781/0x4d10 [ 1372.519355][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1372.524625][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1372.529737][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1372.535268][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1372.539887][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1372.544411][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1372.550050][ C1] ip_local_deliver+0x62a/0x7c0 [ 1372.554920][ C1] ip_rcv+0x6cf/0x750 [ 1372.559057][ C1] process_backlog+0xfb5/0x14e0 [ 1372.564280][ C1] net_rx_action+0x746/0x1aa0 [ 1372.569069][ C1] __do_softirq+0x311/0x83d [ 1372.573799][ C1] [ 1372.576142][ C1] Uninit was stored to memory at: [ 1372.581373][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1372.587119][ C1] __msan_chain_origin+0x50/0x90 [ 1372.592079][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1372.597384][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1372.602504][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1372.607631][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1372.612689][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1372.618165][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1372.622786][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1372.627307][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1372.632891][ C1] ip_local_deliver+0x62a/0x7c0 [ 1372.637754][ C1] ip_rcv+0x6cf/0x750 [ 1372.641854][ C1] process_backlog+0xfb5/0x14e0 [ 1372.646724][ C1] net_rx_action+0x746/0x1aa0 [ 1372.651499][ C1] __do_softirq+0x311/0x83d [ 1372.656000][ C1] [ 1372.658336][ C1] Uninit was stored to memory at: [ 1372.663374][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1372.669110][ C1] __msan_chain_origin+0x50/0x90 [ 1372.674068][ C1] tcp_conn_request+0x1781/0x4d10 [ 1372.679109][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1372.684461][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1372.689517][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1372.695052][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1372.699806][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1372.704330][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1372.709807][ C1] ip_local_deliver+0x62a/0x7c0 [ 1372.714675][ C1] ip_rcv+0x6cf/0x750 [ 1372.718696][ C1] process_backlog+0xfb5/0x14e0 [ 1372.723653][ C1] net_rx_action+0x746/0x1aa0 [ 1372.728352][ C1] __do_softirq+0x311/0x83d [ 1372.732863][ C1] [ 1372.735199][ C1] Uninit was stored to memory at: [ 1372.740245][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1372.745983][ C1] __msan_chain_origin+0x50/0x90 [ 1372.751060][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1372.756360][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1372.761403][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1372.766535][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1372.771572][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1372.776960][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1372.781568][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1372.786090][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1372.791727][ C1] ip_local_deliver+0x62a/0x7c0 [ 1372.796591][ C1] ip_rcv+0x6cf/0x750 [ 1372.800586][ C1] process_backlog+0xfb5/0x14e0 [ 1372.805452][ C1] net_rx_action+0x746/0x1aa0 [ 1372.810143][ C1] __do_softirq+0x311/0x83d [ 1372.814647][ C1] [ 1372.816981][ C1] Uninit was stored to memory at: [ 1372.822023][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1372.827844][ C1] __msan_chain_origin+0x50/0x90 [ 1372.832879][ C1] tcp_conn_request+0x1781/0x4d10 [ 1372.838001][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1372.843192][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1372.848231][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1372.853615][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1372.858320][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1372.863004][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1372.868476][ C1] ip_local_deliver+0x62a/0x7c0 [ 1372.873336][ C1] ip_rcv+0x6cf/0x750 [ 1372.877332][ C1] process_backlog+0xfb5/0x14e0 [ 1372.882394][ C1] net_rx_action+0x746/0x1aa0 [ 1372.887237][ C1] __do_softirq+0x311/0x83d [ 1372.891742][ C1] [ 1372.894211][ C1] Uninit was stored to memory at: [ 1372.899343][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1372.905088][ C1] __msan_chain_origin+0x50/0x90 [ 1372.910054][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1372.915490][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1372.920525][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1372.925658][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1372.930771][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1372.936160][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1372.940985][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1372.945506][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1372.950988][ C1] ip_local_deliver+0x62a/0x7c0 [ 1372.955863][ C1] ip_rcv+0x6cf/0x750 [ 1372.959871][ C1] process_backlog+0xfb5/0x14e0 [ 1372.964737][ C1] net_rx_action+0x746/0x1aa0 [ 1372.969433][ C1] __do_softirq+0x311/0x83d [ 1372.973938][ C1] [ 1372.976274][ C1] Uninit was stored to memory at: [ 1372.981318][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1372.987229][ C1] __msan_chain_origin+0x50/0x90 [ 1372.992191][ C1] tcp_conn_request+0x1781/0x4d10 [ 1372.997233][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1373.002359][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1373.007398][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1373.012784][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1373.017390][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1373.021908][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1373.027478][ C1] ip_local_deliver+0x62a/0x7c0 [ 1373.032339][ C1] ip_rcv+0x6cf/0x750 [ 1373.036334][ C1] process_backlog+0xfb5/0x14e0 [ 1373.041201][ C1] net_rx_action+0x746/0x1aa0 [ 1373.045893][ C1] __do_softirq+0x311/0x83d [ 1373.050511][ C1] [ 1373.052844][ C1] Uninit was created at: [ 1373.057247][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 1373.063228][ C1] kmsan_alloc_page+0xb9/0x180 [ 1373.068102][ C1] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1373.073746][ C1] alloc_pages_current+0x672/0x990 [ 1373.078879][ C1] alloc_slab_page+0x122/0x1300 [ 1373.083746][ C1] new_slab+0x2bc/0x1130 [ 1373.088010][ C1] ___slab_alloc+0x14a3/0x2040 [ 1373.092882][ C1] kmem_cache_alloc+0xb23/0xd70 [ 1373.097820][ C1] inet_reqsk_alloc+0xac/0x830 [ 1373.102604][ C1] tcp_conn_request+0x753/0x4d10 [ 1373.107771][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1373.112898][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1373.118280][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1373.122886][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1373.127409][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1373.132882][ C1] ip_local_deliver+0x62a/0x7c0 [ 1373.137743][ C1] ip_sublist_rcv+0x125d/0x1450 [ 1373.142603][ C1] ip_list_rcv+0x904/0x970 [ 1373.147039][ C1] __netif_receive_skb_list_core+0x1459/0x14d0 [ 1373.153214][ C1] netif_receive_skb_list_internal+0xf66/0x1610 [ 1373.159472][ C1] napi_complete_done+0x439/0xe10 [ 1373.164510][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 1373.169891][ C1] virtnet_poll+0x1468/0x19f0 [ 1373.174647][ C1] net_rx_action+0x746/0x1aa0 [ 1373.179338][ C1] __do_softirq+0x311/0x83d 05:57:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:12 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1374.214758][T27600] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1374.322820][T27600] device dummy0 entered promiscuous mode 05:57:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1374.401633][T27600] device dummy0 left promiscuous mode 05:57:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5", 0x19) 05:57:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, 0x0) 05:57:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5", 0x19) 05:57:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5", 0x19) 05:57:14 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, 0x0) 05:57:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:16 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f46", 0x1d) 05:57:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x170, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x13c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x170}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, 0x0) 05:57:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1377.386385][T27650] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f46", 0x1d) 05:57:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:17 executing program 2: 05:57:17 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1378.005168][T27668] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:17 executing program 2: 05:57:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f46", 0x1d) 05:57:17 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:17 executing program 2: [ 1378.544865][T27691] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f465621", 0x1f) 05:57:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:18 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:18 executing program 2: 05:57:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f465621", 0x1f) [ 1379.145304][T27714] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:18 executing program 2: 05:57:18 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f465621", 0x1f) [ 1379.628206][T27731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f46562111", 0x20) 05:57:21 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:21 executing program 2: [ 1382.160927][T27745] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:21 executing program 2: 05:57:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "6b1c684768fe3c0bf00b7f12eb8cfd0bfec2f11ecb8f87e8de5c105acb219b0a8f4c111ad53620401ca12d736070919840b5ecabc5a429b3dc5c20de3fb410cde8a13006dc3e93af9591159c84c14ee01cb99631bdf5dc42710e08999b7d93ef594127b64413346ecedcc81a268e2313067efc9bda524ddf6a39a5ffd23a0e21e0366a63c542355e163f03f6d27c2e07658e66e42f8a9019ce4130c19573a9415655dd191eec46db7883953e6be05f469ce9681a7e481fe4e4fb032e2615163a5d4d6359af209f71303a43dabde1244263287658201f2649380743761fab7649248164d6f78051323c6a6cd1b68d8d3e3d95ae699568bb02124e0149e9a89a23"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:21 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f46562111", 0x20) [ 1382.722545][T27762] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:22 executing program 2: 05:57:22 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1382.856569][T27762] device bond_slave_0 entered promiscuous mode [ 1382.862906][T27762] device bond_slave_1 entered promiscuous mode [ 1382.872444][T27762] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:57:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="02dc7145a6f41be96ba9954bdb5e72ad14a6c3ce140272f0d5953b3f46562111", 0x20) [ 1383.073364][T27762] device bond_slave_0 left promiscuous mode [ 1383.079559][T27762] device bond_slave_1 left promiscuous mode 05:57:24 executing program 4: 05:57:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:24 executing program 2: 05:57:24 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:24 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1385.404568][T27791] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:24 executing program 4: [ 1385.512594][T27791] device bond_slave_0 entered promiscuous mode [ 1385.518974][T27791] device bond_slave_1 entered promiscuous mode [ 1385.528608][T27791] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1385.545161][T27791] device bond_slave_0 left promiscuous mode [ 1385.551345][T27791] device bond_slave_1 left promiscuous mode 05:57:24 executing program 2: 05:57:24 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x84301, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x3}) socketpair(0x6, 0x0, 0x40, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000000)) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffc}, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x16000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x4}, 0x10}, 0x78) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r4, 0x8001a0, 0xe, 0x0, &(0x7f0000000380)="4d50b441e692763513ef874588a8", 0x0, 0x3b}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1d, 0xa, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0xa, 0x7, 0x7, 0xfffffffffffffff8, 0xfffffffffffffff0}, @map, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0xc, 0x3, 0xb, 0xfffffffffffffff4}, @jmp={0x5, 0x1, 0xb, 0x0, 0xa, 0x0, 0x8}]}, &(0x7f0000000380)='GPL\x00', 0x3, 0xb8, &(0x7f00000003c0)=""/184, 0x41100, 0x8, [], 0x0, 0x1b, r2, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x3, 0x7, 0x3}, 0x10, 0x0, r3}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='\xc2(:security\\$\xd1-&GPL$vmnet0eth0\xcc..\x00'}, 0x10) 05:57:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f065581fffffff07004000630677fbac14140ee9", 0x0, 0x102, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 05:57:25 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x7}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000000)="050000002300040000068908ac14140de20000093c31b47d0510c147885b6e765e30637ec921f605", 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 1386.854710][ C1] not chained 510000 origins [ 1386.859390][ C1] CPU: 1 PID: 24158 Comm: kworker/u4:27 Not tainted 5.8.0-rc5-syzkaller #0 [ 1386.867977][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1386.878054][ C1] Workqueue: krdsd rds_connect_worker [ 1386.883425][ C1] Call Trace: [ 1386.886713][ C1] [ 1386.889578][ C1] dump_stack+0x1df/0x240 [ 1386.893929][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 1386.899661][ C1] ? should_fail+0x72/0x9e0 [ 1386.904176][ C1] ? ret_from_fork+0x22/0x30 [ 1386.908779][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1386.914864][ C1] ? arch_stack_walk+0x34c/0x3e0 [ 1386.919817][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1386.925044][ C1] ? __should_failslab+0x1f6/0x290 [ 1386.930167][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 1386.935293][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1386.941115][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 1386.947278][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 1386.952605][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1386.957814][ C1] __msan_chain_origin+0x50/0x90 [ 1386.962767][ C1] tcp_conn_request+0x1781/0x4d10 [ 1386.967855][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1386.973935][ C1] ? cache_from_obj+0x3d5/0x6b0 [ 1386.978797][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1386.984027][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1386.989248][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1386.994379][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1386.999410][ C1] ? inet6_sk_rx_dst_set+0x400/0x400 [ 1387.004679][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1387.010341][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1387.015522][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1387.021315][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1387.027376][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1387.032577][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1387.037161][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1387.041652][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 1387.047739][ C1] ? tcp_filter+0xf0/0xf0 [ 1387.052054][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1387.057683][ C1] ip_local_deliver+0x62a/0x7c0 [ 1387.062569][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 1387.067619][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 1387.073243][ C1] ip_rcv+0x6cf/0x750 [ 1387.077219][ C1] ? ip_rcv_core+0x12c0/0x12c0 [ 1387.081965][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 1387.087628][ C1] process_backlog+0xfb5/0x14e0 [ 1387.092500][ C1] ? lapic_next_event+0x6e/0xa0 [ 1387.097380][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 1387.102660][ C1] net_rx_action+0x746/0x1aa0 [ 1387.107335][ C1] ? net_tx_action+0xc40/0xc40 [ 1387.112086][ C1] __do_softirq+0x311/0x83d [ 1387.116602][ C1] asm_call_on_stack+0x12/0x20 [ 1387.121363][ C1] [ 1387.124300][ C1] do_softirq_own_stack+0x7c/0xa0 [ 1387.129310][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 1387.134515][ C1] local_bh_enable+0x36/0x40 [ 1387.139103][ C1] ip_finish_output2+0x1fee/0x24a0 [ 1387.144222][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 1387.150243][ C1] __ip_finish_output+0xaa7/0xd80 [ 1387.155283][ C1] ip_finish_output+0x166/0x410 [ 1387.160163][ C1] ip_output+0x593/0x680 [ 1387.164402][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 1387.169672][ C1] ? ip_finish_output+0x410/0x410 [ 1387.174677][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 1387.179597][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 1387.185128][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1387.190346][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1387.195557][ C1] ip_queue_xmit+0xcc/0xf0 [ 1387.199967][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 1387.204802][ C1] __tcp_transmit_skb+0x440e/0x6090 [ 1387.210052][ C1] tcp_connect+0x4208/0x6830 [ 1387.214651][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 1387.219949][ C1] tcp_v4_connect+0x21fd/0x2370 [ 1387.224828][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 1387.229776][ C1] __inet_stream_connect+0x2fb/0x1340 [ 1387.235141][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 1387.240420][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1387.245626][ C1] inet_stream_connect+0x101/0x180 [ 1387.250740][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 1387.256389][ C1] rds_tcp_conn_path_connect+0x8a7/0xb70 [ 1387.262034][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1387.267223][ C1] ? rds_tcp_state_change+0x390/0x390 [ 1387.272578][ C1] rds_connect_worker+0x2a6/0x470 [ 1387.277601][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1387.283653][ C1] ? rds_addr_cmp+0x200/0x200 [ 1387.288357][ C1] process_one_work+0x1540/0x1f30 [ 1387.293383][ C1] worker_thread+0xed2/0x23f0 [ 1387.298057][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1387.303867][ C1] kthread+0x515/0x550 [ 1387.307925][ C1] ? process_one_work+0x1f30/0x1f30 [ 1387.313111][ C1] ? kthread_blkcg+0xf0/0xf0 [ 1387.317700][ C1] ret_from_fork+0x22/0x30 [ 1387.322116][ C1] Uninit was stored to memory at: [ 1387.327124][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1387.332825][ C1] __msan_chain_origin+0x50/0x90 [ 1387.337754][ C1] tcp_conn_request+0x1781/0x4d10 [ 1387.342773][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1387.347867][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1387.352910][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1387.358266][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1387.362838][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1387.367331][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1387.372788][ C1] ip_local_deliver+0x62a/0x7c0 [ 1387.377634][ C1] ip_rcv+0x6cf/0x750 [ 1387.381610][ C1] process_backlog+0xfb5/0x14e0 [ 1387.386439][ C1] net_rx_action+0x746/0x1aa0 [ 1387.391113][ C1] __do_softirq+0x311/0x83d [ 1387.395596][ C1] [ 1387.397916][ C1] Uninit was stored to memory at: [ 1387.402943][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1387.408661][ C1] __msan_chain_origin+0x50/0x90 [ 1387.413583][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1387.418851][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1387.423875][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1387.428982][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1387.434013][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1387.439375][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1387.443946][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1387.448448][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1387.453918][ C1] ip_local_deliver+0x62a/0x7c0 [ 1387.458761][ C1] ip_rcv+0x6cf/0x750 [ 1387.462737][ C1] process_backlog+0xfb5/0x14e0 [ 1387.467612][ C1] net_rx_action+0x746/0x1aa0 [ 1387.472296][ C1] __do_softirq+0x311/0x83d [ 1387.476841][ C1] [ 1387.479153][ C1] Uninit was stored to memory at: [ 1387.484206][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1387.489939][ C1] __msan_chain_origin+0x50/0x90 [ 1387.494902][ C1] tcp_conn_request+0x1781/0x4d10 [ 1387.499931][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1387.505090][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1387.510127][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1387.515486][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1387.520121][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1387.524628][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1387.530088][ C1] ip_local_deliver+0x62a/0x7c0 [ 1387.534927][ C1] ip_rcv+0x6cf/0x750 [ 1387.538915][ C1] process_backlog+0xfb5/0x14e0 [ 1387.543779][ C1] net_rx_action+0x746/0x1aa0 [ 1387.548854][ C1] __do_softirq+0x311/0x83d [ 1387.553343][ C1] [ 1387.555697][ C1] Uninit was stored to memory at: [ 1387.560728][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1387.566461][ C1] __msan_chain_origin+0x50/0x90 [ 1387.571403][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1387.576670][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1387.581693][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1387.586801][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1387.591829][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1387.597196][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1387.601794][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1387.606288][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1387.611748][ C1] ip_local_deliver+0x62a/0x7c0 [ 1387.616621][ C1] ip_rcv+0x6cf/0x750 [ 1387.620603][ C1] process_backlog+0xfb5/0x14e0 [ 1387.625463][ C1] net_rx_action+0x746/0x1aa0 [ 1387.630144][ C1] __do_softirq+0x311/0x83d [ 1387.634633][ C1] [ 1387.636937][ C1] Uninit was stored to memory at: [ 1387.641946][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1387.647658][ C1] __msan_chain_origin+0x50/0x90 [ 1387.652602][ C1] tcp_conn_request+0x1781/0x4d10 [ 1387.657632][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1387.662732][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1387.667749][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1387.673118][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1387.677697][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1387.682198][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1387.687657][ C1] ip_local_deliver+0x62a/0x7c0 [ 1387.692486][ C1] ip_rcv+0x6cf/0x750 [ 1387.696464][ C1] process_backlog+0xfb5/0x14e0 [ 1387.701294][ C1] net_rx_action+0x746/0x1aa0 [ 1387.705950][ C1] __do_softirq+0x311/0x83d [ 1387.710423][ C1] [ 1387.712746][ C1] Uninit was stored to memory at: [ 1387.717771][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1387.723470][ C1] __msan_chain_origin+0x50/0x90 [ 1387.728404][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1387.733672][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1387.738688][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1387.743810][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1387.749176][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1387.753766][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1387.758262][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1387.763715][ C1] ip_local_deliver+0x62a/0x7c0 [ 1387.768552][ C1] ip_sublist_rcv+0x125d/0x1450 [ 1387.773381][ C1] ip_list_rcv+0x904/0x970 [ 1387.777792][ C1] __netif_receive_skb_list_core+0x1459/0x14d0 [ 1387.783943][ C1] netif_receive_skb_list_internal+0xf66/0x1610 [ 1387.790163][ C1] napi_complete_done+0x439/0xe10 [ 1387.795184][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 1387.800554][ C1] virtnet_poll+0x1468/0x19f0 [ 1387.805228][ C1] net_rx_action+0x746/0x1aa0 [ 1387.809884][ C1] __do_softirq+0x311/0x83d [ 1387.814359][ C1] [ 1387.816674][ C1] Uninit was stored to memory at: [ 1387.821693][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1387.827405][ C1] __msan_chain_origin+0x50/0x90 [ 1387.832335][ C1] tcp_conn_request+0x1781/0x4d10 [ 1387.837339][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1387.842430][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1387.847796][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1387.852378][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1387.856866][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1387.862303][ C1] ip_local_deliver+0x62a/0x7c0 [ 1387.867144][ C1] ip_sublist_rcv+0x125d/0x1450 [ 1387.871987][ C1] ip_list_rcv+0x904/0x970 [ 1387.876398][ C1] __netif_receive_skb_list_core+0x1459/0x14d0 [ 1387.882554][ C1] netif_receive_skb_list_internal+0xf66/0x1610 [ 1387.888803][ C1] napi_complete_done+0x439/0xe10 [ 1387.893828][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 1387.899185][ C1] virtnet_poll+0x1468/0x19f0 [ 1387.903869][ C1] net_rx_action+0x746/0x1aa0 [ 1387.908561][ C1] __do_softirq+0x311/0x83d [ 1387.913073][ C1] [ 1387.915399][ C1] Uninit was created at: [ 1387.919634][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 1387.925265][ C1] kmsan_alloc_page+0xb9/0x180 [ 1387.930039][ C1] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1387.935578][ C1] alloc_pages_current+0x672/0x990 [ 1387.940689][ C1] alloc_slab_page+0x122/0x1300 [ 1387.945519][ C1] new_slab+0x2bc/0x1130 [ 1387.949765][ C1] ___slab_alloc+0x14a3/0x2040 [ 1387.954509][ C1] kmem_cache_alloc+0xb23/0xd70 [ 1387.959345][ C1] inet_reqsk_alloc+0xac/0x830 [ 1387.964089][ C1] tcp_conn_request+0x753/0x4d10 [ 1387.969021][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1387.974115][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1387.979491][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1387.984091][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1387.988584][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1387.994035][ C1] ip_local_deliver+0x62a/0x7c0 [ 1387.998883][ C1] ip_sublist_rcv+0x125d/0x1450 [ 1388.003736][ C1] ip_list_rcv+0x904/0x970 [ 1388.008165][ C1] __netif_receive_skb_list_core+0x1459/0x14d0 [ 1388.014299][ C1] netif_receive_skb_list_internal+0xf66/0x1610 [ 1388.020550][ C1] napi_complete_done+0x439/0xe10 [ 1388.025570][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 1388.030920][ C1] virtnet_poll+0x1468/0x19f0 [ 1388.035580][ C1] net_rx_action+0x746/0x1aa0 [ 1388.040240][ C1] __do_softirq+0x311/0x83d 05:57:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:27 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f065581fffffff07004000632f77fbac14140ee9", 0x0, 0x102, 0x60000000, 0x0, 0x102, 0x0, &(0x7f00000000c0)="61ae793cb58796e98bec67538e015077de7e272f4c"}, 0x40) 05:57:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:27 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x7}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000000)="050000002300040000068908ac14140de20000093c31b47d0510c147885b6e765e30637ec921f605", 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 1388.602573][T27839] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1388.694699][T27839] device bond_slave_0 entered promiscuous mode [ 1388.701086][T27839] device bond_slave_1 entered promiscuous mode [ 1388.710683][T27839] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:57:28 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x7}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000000)="050000002300040000068908ac14140de20000093c31b47d0510c147885b6e765e30637ec921f605", 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:57:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1388.876977][T27839] device bond_slave_0 left promiscuous mode [ 1388.883162][T27839] device bond_slave_1 left promiscuous mode 05:57:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001240)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e07000000000000001f1946f7071a463143fb42c20e017feec42107f3e6ddbe1150296c6a6db4afa7c81bb8f788d231d4168f72dd748af53f734eda889a174c066e08e267f2ccabe50567a5ceb5475c49d29e934a49d909e45376060f502d438f18257ff8212c4404f578e3494b7bb1b4c6f15be97ea13bb21984bb9ac3bbdbbfc4668559ff0500076687ed7c40842fae1b4e49520f48c28a66493f408e0b6580fdfbe0533397884333f79d332108ad842c6a2f44380e359ba9f20a6772651008ba17787e632f391ce14dcbb11679ec237adb866eb8c0735f167607777a8c018488174ca40f03974daefd0f291ab7158de2d60eded18369d5cfc287d54721dcd12815a540107799bd1b3f006a65200301feba0eee252c71b3824bc77f48e59890b2d4f5763db36d366631e77825a1fc802ba31c82b46935aafb835efaaa4eb29da8e4f2815a22e1c1e7b98e5544f92bffcae37c6410b7aba7c2c59c7bd805605c3460fca5ced768d55e8511235abb4a53bd7b1b62f1420e000000b2393a8b0e8ec5a52f559b33ddbc9d90ad1cdf9b12970f976ac7dd1be33da7ceee3962b2628794c24932afbb5ccfae33276290d8c5a1b818411e158d51194c14cc3a4bd100000000000040b821c0e98691797d7bb68582fbfb260ae4fe105e2e76837ff39df74785b5d0df9a5378e2bf0f532335a4321abe71ef450c8a13d084977992e5f7edbb3c45a53ed3f7bf91f94c3f4b66c3510ddebba1079112b5407bdda9bcf378d253e0ea49b999c06866300f1d5807cf9650d7e05c6808499726da70b2405fd42b7e2d614a0c35bad86182c242cdc0d4ff7934f0ef4bad1c21d946f979df26b83af70a271c46a9b80f231c6e6ece1d855ee019a279a7d5fef9e300a58be065dd7bd22c0643ec4d3713a7089d7b93f7d776c030e740d6ff6b11ce462e8262e47f171bd3085c4158"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac1414330200000162079f4b4d2f87e5feca6aab840413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x9, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2d, 'memory'}, {0x3e, 'memory'}, {0x0, 'cpu'}, {0x2b, 'io'}]}, 0x19) 05:57:28 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='net_prio.prioidx\x00', 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={@cgroup, 0xffffffffffffffff, 0x14, 0x4, r1}, 0x14) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20000810) sendmsg(r2, &(0x7f0000000680)={0x0, 0x13000003, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x780f8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="9c20cdd159d58feff7d14622ca3c14a759929130bb9fea08adeab37126662ef5f2aa6d7051906fa3743bc815b4e3943900be3bc5b2443c83f564725dce060229c76c34e415acb8ef902ae8f9b853f8723ad59f63ab605d3db2add8a0444c54750163888b7c1f4ab0bbb411fdc616a774bd34f10b5e75234dd11b9ac0ed33c3f1a4081c2b398a8dd6684e3186ba65345f69796206b08c6a8ad60944235527a544510410e93ab7c3b736ff00000097c2481788b1574890e42040f8e50bfc356c1af899eac5e617d20e963f625a45d56d2770067774c70f3ea8d84c9c2fc4a985b1ad2d626957d8c4ada6aaa474397a7920f3d4f765254c2659a0f856b697e94dfb2b820a4dcbc68111206e1d3f3e9b5b088f1fa0ffa3ef068b0d9e705427510fb4000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x3, 0x40, 0x0, 0x40, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x3}, 0x1800, 0x0, 0x0, 0x8, 0x4, 0xfffffffd, 0x1f}, 0x0, 0xb, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000008c0)=ANY=[@ANYBLOB="05000000000000000000000000000000148cf75547d9506651a145514f86158d308a774dc448625821ebc311c1dad70ef4c800a60196ccbbd7970c62f6ae62cda59528714b5c2717250c7a082bec469f81d397dbe842cbd62c911c8e21b69da4412ad93f353a13b16dd729de94596fd9f9941fb1e3017387671db5e2e44cd17232793391d03a57243f1f123db2eb526a64da6e0fb4e1c562772c7b75f5b0bbbd7454591e040d8c335068b7ab144a02e4e66b76fa41fdd7be49b4fb2b3116224cd538c1f3643c65f85cf112122f23d62b842f2928c313401667b74260047df3dbf1ad189611aafbc2f73f074eddea5c3a552cdbbe438843d90caa0a6c92d7baf82bd42aa36d481169ad3ba94981516f9bef6de6c430281ab257dd059e1e0604f04a7b2116d12e5d2f501d98c646e06fb7d1950f90707c851bc48876f5209985978bff323901b728ff8fe7ada7a286a2dda15338a1d79e6636604011453326858b0288db57e926196d45d5a8e3ff5422ba3c8be1a30fe454b00a"]) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00y.\xfc*_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7f\r\xb2\xcf\x8a\xc9(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0-\x96\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:30 executing program 2: [ 1391.782101][T27888] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:31 executing program 4: [ 1391.917795][T27888] device bond_slave_0 entered promiscuous mode [ 1391.924162][T27888] device bond_slave_1 entered promiscuous mode [ 1391.933784][T27888] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:57:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1392.080805][T27888] device bond_slave_0 left promiscuous mode [ 1392.087053][T27888] device bond_slave_1 left promiscuous mode 05:57:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:31 executing program 2: 05:57:31 executing program 4: 05:57:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:32 executing program 2: 05:57:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:34 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:34 executing program 4: 05:57:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, 0x0) 05:57:34 executing program 2: [ 1394.915506][T27923] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1394.994535][T27923] device bond_slave_0 entered promiscuous mode [ 1395.000949][T27923] device bond_slave_1 entered promiscuous mode [ 1395.010757][T27923] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:57:34 executing program 2: 05:57:34 executing program 4: [ 1395.151765][T27923] device bond_slave_0 left promiscuous mode [ 1395.157956][T27923] device bond_slave_1 left promiscuous mode 05:57:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:35 executing program 4: 05:57:35 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x84) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) setsockopt$sock_attach_bpf(r0, 0x84, 0x77, &(0x7f0000000140)=r2, 0x61) 05:57:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, 0x0) 05:57:35 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1396.215919][T27952] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1396.314233][T27952] device bond_slave_0 entered promiscuous mode [ 1396.320623][T27952] device bond_slave_1 entered promiscuous mode [ 1396.330324][T27952] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1396.462081][T27952] device bond_slave_0 left promiscuous mode [ 1396.468245][T27952] device bond_slave_1 left promiscuous mode 05:57:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002800)=ANY=[@ANYBLOB="b702000006000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a0afe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83927dd29c034055b67dafe6c8dc3d5d7870336e6a3523d1f5310efd4989147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc0b132b8667c21476619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e6ea09c346dfebd31a08060000000200000000000000334d83239dd27080e71113610e000058e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0288535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc186ae2ed4b4390af9a9ceefd07e002cab5ebf8aad34732181feb215139f15ea7e8cb0c7cbe31fbae7c34d5ac5e7e64c21add9191eadd6e1795ad6a0f7f8cd3fcc3dc3dec04b25dfc17975238345d4f71af35910b158c36657b7218baaa7cbf781c0a99bd50499ccc421ace5e85efb5b7e64e4beba3da8223fe5308e4e65ee93e1d92b9f99f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086e97bcc5ca0e221a0e34323c129102b6ff0500002e88a1940b3c02ed9c92d6f64b1282dc51bb00159830d7617001154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059514119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf754a56e4b2d0f22d428bd705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab01bad188885f1ea8f2371b1f243e99fe33c3cdafda323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab9261503def363fb099408885afc2bf9a4f8c35070669ea69f4e4be1b8e0d6697e97186fc51439d670dba6623279f73db9dec75070cd9ab0fd96b069ef6d2857b6bf955012cf7fe50d133d541da86e0477e4a6cc999dc21c3ef408e633dfa35f14d6e734837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cad4ead134847425a6da2c8067ab743c1d82a5687f2ed6900000000000000000000000000000000000000000000996e291aa1503a601b3f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb060047b88486cacee4ccd8aeeda2919a4bff2ed893f20a6aba26cce2d4eedf356701c56051a9f748e5aaf10a10bd8c40889967a39d57e6565264e3d3f8e0048e55ae289ce2ad77c43c549737d6d79ce71d4dca0cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef009e335ac1d579c29cbf09fd1ce5242402c8c88272395d2d7bbd79589787ca56314c3b90d51e8b74a669010b09d1fa90320e83ec9e6c03e683e2615d66a3a83f5a3ffef9429fbc5d9c6a3f2bebec94a3bb64e1b2cd5c38cad3f1457c6b1b2318706ce5f4f73c05a2ffc6d0af1a514d228ff6ca2c0ef73a370751b171cd72970d60b26cfe6649f4c0add883e729e1d546f1e1bb5402a7f90415ac0081005a898b4d52b76d18e8e3c619d50f76bc5fc7212b5fcfa177c13c558f19da8f5db2cc032932a924de4916470ccc6b80034ee90bcf5ed4b938580bb71b43bf38e7a3fe0446b5348e3d610e2f5db457ae562ccc1ac5b6c2751a6a786a4090a14e23d225a5dd452a30ea88b2cf2b9261b0157d2822ff706586675f463094f563437177e41e0a990db41b7624cf4f496092736a4976e81513fc8dcf08d494c7f1c3edce1f7b0313d0376e36cb2dde63d77a4452a0faf723c4940c0a77b8ab3aa02a55ee8872fe84b2b91ec1a6670f2ddae2079e8e9a6bcd98449761624e6767ff00000000000000000000000000000000e423432788ce02f5e3a0979103719dc5e790d85ce6d55f8a3846232d69a1879d86598a89bd8c59796fe1500f5252ffd193952d8a5976cbf494780000000000db97b88e4ae1c401f3d97e8d32339cec6d4e1be9ac0525b7adc046fde293e4c5442a8ae3a6a7708967882f4fca0df2274ef1816b2bedf41f2b0272fab6d5f9772f8d8afd3f56ae6329f9240f22bb42"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x43, 0x0, &(0x7f0000000280)="b9ff0300600d698c389e14f008001fffffff0000400063010000e0000000e0e000000062050000002fbd53039e6aab84181aa500"/67, 0x0, 0xfc, 0x60000000, 0x0, 0x0, &(0x7f0000000140)="486e90decd837f7e62c4f903a15a12d35c31c761c1da726b54ccd47736cdde536c0b3e75ef5c913757491df3e38f5cc44e6847bdc594358967964f76aa9f31a6", &(0x7f0000000e00)="e2cf5bb7e5746a6740aebad755a0c2f42d131e1493afc9154aeae4ff8916e84fae2dbac6ba23acee58596467b1d68d886cf44ae164800edec75a809bcc514384c499930e5c18337dcbedb8e326b8b42e4ba1acb01b73cdcef9b719fb5ce7b547f9324fbebb24d0fd464fa10fd1fccf19f0f42441b5b27a5c93b29874c85ae55fd3cce1e8b903601c"}, 0x29) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:57:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r2, r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x8001) close(r3) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000014c0)='tasks\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001480)='pids.max\x00', 0x2, 0x0) 05:57:37 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x15c, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x128, 0x2, [@TCA_RED_STAB={0x104, 0x2, "6b1c684768fe3c0bf00b7f12eb8cfd0bfec2f11ecb8f87e8de5c105acb219b0a8f4c111ad53620401ca12d736070919840b5ecabc5a429b3dc5c20de3fb410cde8a13006dc3e93af9591159c84c14ee01cb99631bdf5dc42710e08999b7d93ef594127b64413346ecedcc81a268e2313067efc9bda524ddf6a39a5ffd23a0e21e0366a63c542355e163f03f6d27c2e07658e66e42f8a9019ce4130c19573a9415655dd191eec46db7883953e6be05f469ce9681a7e481fe4e4fb032e2615163a5d4d6359af209f71303a43dabde1244263287658201f2649380743761fab7649248164d6f78051323c6a6cd1b68d8d3e3d95ae699568bb02124e0149e9a89a23"}, @TCA_RED_FLAGS={0xc}, @TCA_RED_PARMS={0x14}]}}]}, 0x15c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={0x0, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, 0x0) 05:57:37 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1398.114605][T27969] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1398.211365][T27969] device bond_slave_0 entered promiscuous mode [ 1398.217741][T27969] device bond_slave_1 entered promiscuous mode [ 1398.227487][T27969] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:57:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)="2e00000013008105e00f80ecdbc0b5f207c804a01e000000302e20000000a3030e000c0002000202aacc2b2043b2", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) [ 1398.345489][T27969] device bond_slave_0 left promiscuous mode [ 1398.351795][T27969] device bond_slave_1 left promiscuous mode 05:57:37 executing program 0: r0 = epoll_create(0x1) close(r0) close(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @dev}, 0x10) 05:57:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:38 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x12000) 05:57:38 executing program 4: 05:57:38 executing program 2: 05:57:38 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1399.533209][T28001] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1399.621176][T28001] device bond_slave_0 entered promiscuous mode [ 1399.627587][T28001] device bond_slave_1 entered promiscuous mode [ 1399.637403][T28001] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1399.763233][T28001] device bond_slave_0 left promiscuous mode [ 1399.769363][T28001] device bond_slave_1 left promiscuous mode 05:57:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:40 executing program 0: 05:57:40 executing program 2: 05:57:40 executing program 4: 05:57:40 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:40 executing program 2: [ 1401.396897][T28018] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:40 executing program 0: [ 1401.510931][T28018] device bond_slave_0 entered promiscuous mode [ 1401.517388][T28018] device bond_slave_1 entered promiscuous mode [ 1401.526980][T28018] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1401.643565][T28018] device bond_slave_0 left promiscuous mode [ 1401.649809][T28018] device bond_slave_1 left promiscuous mode [ 1401.966710][ C0] not chained 520000 origins [ 1401.971480][ C0] CPU: 0 PID: 24107 Comm: kworker/u4:15 Not tainted 5.8.0-rc5-syzkaller #0 [ 1401.980097][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1401.990195][ C0] Workqueue: krdsd rds_tcp_accept_worker [ 1401.995861][ C0] Call Trace: [ 1401.999167][ C0] [ 1402.002046][ C0] dump_stack+0x1df/0x240 [ 1402.006425][ C0] kmsan_internal_chain_origin+0x6f/0x130 [ 1402.012180][ C0] ? inet_twsk_alloc+0xa8a/0xba0 [ 1402.017145][ C0] ? tcp_time_wait+0xcd/0x10b0 [ 1402.022105][ C0] ? tcp_fin+0x1f9/0x890 [ 1402.026386][ C0] ? tcp_data_queue+0x12a3/0x9fd0 [ 1402.031448][ C0] ? tcp_rcv_state_process+0x5ba3/0x71c0 [ 1402.037110][ C0] ? tcp_v4_do_rcv+0xb0f/0xd70 [ 1402.041896][ C0] ? tcp_v4_rcv+0x4c77/0x5040 [ 1402.046594][ C0] ? ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1402.052244][ C0] ? ip_local_deliver+0x62a/0x7c0 [ 1402.057289][ C0] ? ip_rcv+0x6cf/0x750 [ 1402.061482][ C0] ? process_backlog+0xfb5/0x14e0 [ 1402.066531][ C0] ? net_rx_action+0x746/0x1aa0 [ 1402.071465][ C0] ? __do_softirq+0x311/0x83d [ 1402.076164][ C0] ? asm_call_on_stack+0x12/0x20 [ 1402.081133][ C0] ? kmsan_internal_chain_origin+0x30/0x130 [ 1402.087057][ C0] ? local_bh_enable+0x36/0x40 [ 1402.091850][ C0] ? ip_finish_output2+0x1fee/0x24a0 [ 1402.097170][ C0] ? __ip_finish_output+0xaa7/0xd80 [ 1402.102417][ C0] ? ip_finish_output+0x166/0x410 [ 1402.107459][ C0] ? ip_output+0x593/0x680 [ 1402.111902][ C0] ? __ip_queue_xmit+0x1b5c/0x21a0 [ 1402.117176][ C0] ? ip_queue_xmit+0xcc/0xf0 [ 1402.121819][ C0] ? __tcp_transmit_skb+0x440e/0x6090 [ 1402.127226][ C0] ? tcp_write_xmit+0x30b1/0xb430 [ 1402.132381][ C0] ? __tcp_push_pending_frames+0x124/0x4e0 [ 1402.138286][ C0] ? tcp_send_fin+0x131e/0x1570 [ 1402.143171][ C0] ? tcp_shutdown+0x188/0x200 [ 1402.147942][ C0] ? inet_shutdown+0x342/0x5e0 [ 1402.152743][ C0] ? kernel_sock_shutdown+0x9d/0xc0 [ 1402.157973][ C0] ? rds_tcp_accept_one+0xe18/0x1060 [ 1402.163283][ C0] ? rds_tcp_accept_worker+0x61/0x160 [ 1402.168680][ C0] ? process_one_work+0x1540/0x1f30 [ 1402.174106][ C0] ? worker_thread+0xed2/0x23f0 [ 1402.179162][ C0] ? kthread+0x515/0x550 [ 1402.183431][ C0] ? ret_from_fork+0x22/0x30 [ 1402.188069][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1402.193388][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1402.199231][ C0] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1402.205326][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1402.210714][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1402.216543][ C0] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1402.222801][ C0] ? __msan_get_context_state+0x9/0x20 [ 1402.228292][ C0] ? __module_get+0x19/0x230 [ 1402.232902][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1402.238310][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1402.243528][ C0] __msan_chain_origin+0x50/0x90 [ 1402.248499][ C0] __inet_twsk_schedule+0x24e/0x2c0 [ 1402.253846][ C0] tcp_time_wait+0xaca/0x10b0 [ 1402.258563][ C0] tcp_fin+0x1f9/0x890 [ 1402.262745][ C0] tcp_data_queue+0x12a3/0x9fd0 [ 1402.267764][ C0] ? tcp_urg+0x8e1/0xde0 [ 1402.272058][ C0] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1402.277633][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1402.283505][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1402.288971][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1402.293600][ C0] tcp_v4_rcv+0x4c77/0x5040 [ 1402.298211][ C0] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 1402.304724][ C0] ? tcp_v4_rcv+0x1531/0x5040 [ 1402.309590][ C0] ? tcp_filter+0xf0/0xf0 [ 1402.313940][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1402.319437][ C0] ip_local_deliver+0x62a/0x7c0 [ 1402.324326][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 1402.329372][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 1402.335032][ C0] ip_rcv+0x6cf/0x750 [ 1402.339059][ C0] ? ip_rcv_core+0x12c0/0x12c0 [ 1402.344246][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 1402.349910][ C0] process_backlog+0xfb5/0x14e0 [ 1402.354788][ C0] ? lapic_next_event+0x6e/0xa0 [ 1402.359725][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 1402.365173][ C0] net_rx_action+0x746/0x1aa0 [ 1402.369990][ C0] ? net_tx_action+0xc40/0xc40 [ 1402.374787][ C0] __do_softirq+0x311/0x83d [ 1402.379342][ C0] asm_call_on_stack+0x12/0x20 [ 1402.384114][ C0] [ 1402.387235][ C0] do_softirq_own_stack+0x7c/0xa0 [ 1402.392288][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 1402.397671][ C0] local_bh_enable+0x36/0x40 [ 1402.402298][ C0] ip_finish_output2+0x1fee/0x24a0 [ 1402.407683][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 1402.413815][ C0] __ip_finish_output+0xaa7/0xd80 [ 1402.418980][ C0] ip_finish_output+0x166/0x410 [ 1402.423943][ C0] ip_output+0x593/0x680 [ 1402.428244][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 1402.433863][ C0] ? ip_finish_output+0x410/0x410 [ 1402.438926][ C0] __ip_queue_xmit+0x1b5c/0x21a0 [ 1402.444338][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 1402.449923][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1402.455277][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1402.460648][ C0] ip_queue_xmit+0xcc/0xf0 [ 1402.465104][ C0] ? tcp_v6_send_response+0x2920/0x2920 [ 1402.470808][ C0] __tcp_transmit_skb+0x440e/0x6090 [ 1402.476075][ C0] tcp_write_xmit+0x30b1/0xb430 [ 1402.481042][ C0] __tcp_push_pending_frames+0x124/0x4e0 [ 1402.486708][ C0] tcp_send_fin+0x131e/0x1570 [ 1402.491526][ C0] tcp_shutdown+0x188/0x200 [ 1402.496048][ C0] ? tcp_set_state+0x9d0/0x9d0 [ 1402.500842][ C0] inet_shutdown+0x342/0x5e0 [ 1402.505506][ C0] ? inet_recvmsg+0x7d0/0x7d0 [ 1402.510360][ C0] kernel_sock_shutdown+0x9d/0xc0 [ 1402.515417][ C0] rds_tcp_accept_one+0xe18/0x1060 [ 1402.520749][ C0] rds_tcp_accept_worker+0x61/0x160 [ 1402.526191][ C0] ? rds_tcp_exit_net+0xcc0/0xcc0 [ 1402.531249][ C0] process_one_work+0x1540/0x1f30 [ 1402.536415][ C0] worker_thread+0xed2/0x23f0 [ 1402.541141][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1402.547193][ C0] kthread+0x515/0x550 [ 1402.551409][ C0] ? process_one_work+0x1f30/0x1f30 [ 1402.556939][ C0] ? kthread_blkcg+0xf0/0xf0 [ 1402.561558][ C0] ret_from_fork+0x22/0x30 [ 1402.566183][ C0] Uninit was stored to memory at: [ 1402.571390][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1402.577166][ C0] __msan_chain_origin+0x50/0x90 [ 1402.582380][ C0] inet_twsk_alloc+0xab6/0xba0 [ 1402.587407][ C0] tcp_time_wait+0xcd/0x10b0 [ 1402.592021][ C0] tcp_fin+0x1f9/0x890 [ 1402.596220][ C0] tcp_data_queue+0x12a3/0x9fd0 [ 1402.601219][ C0] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1402.606896][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1402.611599][ C0] tcp_v4_rcv+0x4c77/0x5040 [ 1402.616311][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1402.621815][ C0] ip_local_deliver+0x62a/0x7c0 [ 1402.626890][ C0] ip_rcv+0x6cf/0x750 [ 1402.631017][ C0] process_backlog+0xfb5/0x14e0 [ 1402.636137][ C0] net_rx_action+0x746/0x1aa0 [ 1402.640938][ C0] __do_softirq+0x311/0x83d [ 1402.645459][ C0] [ 1402.648024][ C0] Uninit was stored to memory at: [ 1402.653077][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1402.658835][ C0] __msan_chain_origin+0x50/0x90 [ 1402.663805][ C0] __inet_twsk_schedule+0x24e/0x2c0 [ 1402.669045][ C0] tcp_time_wait+0xaca/0x10b0 [ 1402.673748][ C0] tcp_fin+0x1f9/0x890 [ 1402.677836][ C0] tcp_data_queue+0x12a3/0x9fd0 [ 1402.682700][ C0] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1402.688176][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1402.692785][ C0] tcp_v4_rcv+0x4c77/0x5040 [ 1402.697313][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1402.702785][ C0] ip_local_deliver+0x62a/0x7c0 [ 1402.707656][ C0] ip_rcv+0x6cf/0x750 [ 1402.711788][ C0] process_backlog+0xfb5/0x14e0 [ 1402.716657][ C0] net_rx_action+0x746/0x1aa0 [ 1402.721355][ C0] __do_softirq+0x311/0x83d [ 1402.725863][ C0] [ 1402.728343][ C0] Uninit was stored to memory at: [ 1402.733490][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1402.739229][ C0] __msan_chain_origin+0x50/0x90 [ 1402.744187][ C0] tcp_time_wait+0xb7e/0x10b0 [ 1402.748890][ C0] tcp_fin+0x1f9/0x890 [ 1402.752976][ C0] tcp_data_queue+0x12a3/0x9fd0 [ 1402.757936][ C0] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1402.763558][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1402.768172][ C0] tcp_v4_rcv+0x4c77/0x5040 [ 1402.772786][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1402.778264][ C0] ip_local_deliver+0x62a/0x7c0 [ 1402.783249][ C0] ip_rcv+0x6cf/0x750 [ 1402.787397][ C0] process_backlog+0xfb5/0x14e0 [ 1402.792268][ C0] net_rx_action+0x746/0x1aa0 [ 1402.797084][ C0] __do_softirq+0x311/0x83d [ 1402.801600][ C0] [ 1402.803942][ C0] Uninit was stored to memory at: [ 1402.809156][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1402.814898][ C0] __msan_chain_origin+0x50/0x90 [ 1402.819853][ C0] inet_twsk_alloc+0xab6/0xba0 [ 1402.824632][ C0] tcp_time_wait+0xcd/0x10b0 [ 1402.829419][ C0] tcp_fin+0x1f9/0x890 [ 1402.833506][ C0] tcp_data_queue+0x12a3/0x9fd0 [ 1402.838374][ C0] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1402.843855][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1402.848636][ C0] tcp_v4_rcv+0x4c77/0x5040 [ 1402.853165][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1402.858641][ C0] ip_local_deliver+0x62a/0x7c0 [ 1402.863512][ C0] ip_rcv+0x6cf/0x750 [ 1402.867667][ C0] process_backlog+0xfb5/0x14e0 [ 1402.872664][ C0] net_rx_action+0x746/0x1aa0 [ 1402.877359][ C0] __do_softirq+0x311/0x83d [ 1402.881958][ C0] [ 1402.884297][ C0] Uninit was stored to memory at: [ 1402.889347][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1402.895091][ C0] __msan_chain_origin+0x50/0x90 [ 1402.900065][ C0] __inet_twsk_schedule+0x24e/0x2c0 [ 1402.905379][ C0] tcp_time_wait+0xaca/0x10b0 [ 1402.910177][ C0] tcp_fin+0x1f9/0x890 [ 1402.914366][ C0] tcp_data_queue+0x12a3/0x9fd0 [ 1402.919242][ C0] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1402.924950][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1402.929746][ C0] tcp_v4_rcv+0x4c77/0x5040 [ 1402.934298][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1402.939789][ C0] ip_local_deliver+0x62a/0x7c0 [ 1402.944742][ C0] ip_rcv+0x6cf/0x750 [ 1402.948882][ C0] process_backlog+0xfb5/0x14e0 [ 1402.953748][ C0] net_rx_action+0x746/0x1aa0 [ 1402.958440][ C0] __do_softirq+0x311/0x83d [ 1402.963181][ C0] [ 1402.965519][ C0] Uninit was stored to memory at: [ 1402.970570][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1402.976314][ C0] __msan_chain_origin+0x50/0x90 [ 1402.981271][ C0] tcp_time_wait+0xb7e/0x10b0 [ 1402.985963][ C0] tcp_fin+0x1f9/0x890 [ 1402.990179][ C0] tcp_data_queue+0x12a3/0x9fd0 [ 1402.995046][ C0] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1403.000521][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1403.005126][ C0] tcp_v4_rcv+0x4c77/0x5040 [ 1403.009658][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1403.015138][ C0] ip_local_deliver+0x62a/0x7c0 [ 1403.020002][ C0] ip_rcv+0x6cf/0x750 [ 1403.023994][ C0] process_backlog+0xfb5/0x14e0 [ 1403.028968][ C0] net_rx_action+0x746/0x1aa0 [ 1403.033655][ C0] __do_softirq+0x311/0x83d [ 1403.038157][ C0] [ 1403.040500][ C0] Uninit was stored to memory at: [ 1403.045539][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1403.051270][ C0] __msan_chain_origin+0x50/0x90 [ 1403.056221][ C0] inet_twsk_alloc+0xab6/0xba0 [ 1403.061093][ C0] tcp_time_wait+0xcd/0x10b0 [ 1403.065698][ C0] tcp_fin+0x1f9/0x890 [ 1403.070356][ C0] tcp_data_queue+0x12a3/0x9fd0 [ 1403.075403][ C0] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1403.081063][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1403.085677][ C0] tcp_v4_rcv+0x4c77/0x5040 [ 1403.090492][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1403.096075][ C0] ip_local_deliver+0x62a/0x7c0 [ 1403.100949][ C0] ip_rcv+0x6cf/0x750 [ 1403.105095][ C0] process_backlog+0xfb5/0x14e0 [ 1403.110149][ C0] net_rx_action+0x746/0x1aa0 [ 1403.114932][ C0] __do_softirq+0x311/0x83d [ 1403.119442][ C0] [ 1403.121773][ C0] Uninit was created at: [ 1403.126026][ C0] kmsan_save_stack_with_flags+0x3c/0x90 [ 1403.131801][ C0] kmsan_alloc_page+0xb9/0x180 [ 1403.136575][ C0] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1403.142222][ C0] alloc_pages_current+0x672/0x990 [ 1403.147349][ C0] alloc_slab_page+0x122/0x1300 [ 1403.152219][ C0] new_slab+0x2bc/0x1130 [ 1403.156472][ C0] ___slab_alloc+0x14a3/0x2040 [ 1403.161252][ C0] kmem_cache_alloc+0xb23/0xd70 [ 1403.166128][ C0] inet_twsk_alloc+0x135/0xba0 [ 1403.171062][ C0] tcp_time_wait+0xcd/0x10b0 [ 1403.175668][ C0] tcp_fin+0x1f9/0x890 [ 1403.179760][ C0] tcp_data_queue+0x12a3/0x9fd0 [ 1403.184627][ C0] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1403.190112][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1403.194981][ C0] tcp_v4_rcv+0x4c77/0x5040 [ 1403.199575][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1403.205047][ C0] ip_local_deliver+0x62a/0x7c0 [ 1403.209993][ C0] ip_rcv+0x6cf/0x750 [ 1403.213991][ C0] process_backlog+0xfb5/0x14e0 [ 1403.218859][ C0] net_rx_action+0x746/0x1aa0 [ 1403.223547][ C0] __do_softirq+0x311/0x83d 05:57:42 executing program 4: 05:57:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:42 executing program 0: 05:57:42 executing program 2: 05:57:43 executing program 0: 05:57:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:43 executing program 2: 05:57:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 05:57:43 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000028001280090001007665746800000000180002801400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f00000000c0), 0x492492492492627, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 1404.601561][T28050] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1404.681318][T28050] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1404.691872][T28052] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 1404.742273][T28047] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1404.862048][T28047] device team_slave_0 entered promiscuous mode [ 1404.868426][T28047] device team_slave_1 entered promiscuous mode [ 1404.877998][T28047] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1404.896012][T28047] device team_slave_0 left promiscuous mode [ 1404.902410][T28047] device team_slave_1 left promiscuous mode 05:57:44 executing program 2: socket$netlink(0x10, 0x3, 0x8000000004) pipe(0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xa0111000, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x33c, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 1405.268386][T28057] bond1: (slave veth3): Enslaving as an active interface with a down link [ 1405.307172][T28074] bond1: (slave veth5): Enslaving as an active interface with a down link [ 1405.348667][T28128] bond1: (slave vlan2): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 1405.987726][T28063] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1406.000939][T28063] bond0: (slave bond1): Enslaving as an active interface with an up link [ 1406.028157][T28130] device macvtap1 entered promiscuous mode [ 1406.034108][T28130] device virt_wifi0 entered promiscuous mode [ 1406.095448][T28130] device virt_wifi0 left promiscuous mode [ 1406.333961][T28050] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1406.348350][T28122] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 05:57:45 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) splice(r2, 0x0, r0, 0x0, 0x400fffe, 0x0) 05:57:45 executing program 0: r0 = socket$inet(0x2, 0x2000080001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300)={0x0, 0x0, 0x10}, 0xc) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="97", 0x1}], 0x1}, 0x0) 05:57:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008e00)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000004380)="8c", 0x7ffff000}], 0x1}}], 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket(0x9, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x20040015) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) getsockname(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) 05:57:45 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1406.793437][T28168] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1407.048279][T28168] device team_slave_0 entered promiscuous mode [ 1407.054834][T28168] device team_slave_1 entered promiscuous mode [ 1407.064454][T28168] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:57:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) utime(&(0x7f0000000080)='./file0\x00', 0x0) [ 1407.291182][T28168] device team_slave_0 left promiscuous mode [ 1407.297309][T28168] device team_slave_1 left promiscuous mode 05:57:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1, 0x4081003) socket$inet_icmp_raw(0x2, 0x3, 0x1) fallocate(r0, 0x11, 0x2400, 0x100007e00) 05:57:47 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x1c0, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_STAB={0x5c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, {0x12, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, {{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, {0xa, 0x2, [0x0, 0x0, 0x0]}}]}, @TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x130, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_PARMS={0x14}, @TCA_RED_PARMS={0x14}]}}]}, 0x1c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 05:57:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB="6c0000003000014c1604e70000000040000000005800010054000100080001006e6174002c000280280001"], 0x6c}}, 0x0) 05:57:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000040)) readv(r0, &(0x7f0000002600)=[{&(0x7f00000002c0)=""/4096, 0x700}], 0x1) 05:57:47 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000eaca83b2515d2e88159d", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x3c}}, 0x0) [ 1408.846281][T28215] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1408.902964][T28216] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1408.997100][T28216] device team_slave_0 entered promiscuous mode [ 1409.003522][T28216] device team_slave_1 entered promiscuous mode [ 1409.014437][T28216] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1409.034378][T28216] device team_slave_0 left promiscuous mode [ 1409.040595][T28216] device team_slave_1 left promiscuous mode 05:57:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008e00)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000004380)="8c", 0x7ffff000}], 0x1}}], 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket(0x9, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x20040015) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) getsockname(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) 05:57:48 executing program 4: r0 = socket(0x18, 0x2, 0x0) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000000), 0xe, 0x0, 0x0, &(0x7f0000000740)=ANY=[], 0x3c8}, 0x40f) 05:57:49 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000040)="23000000220009bb00b9409b849ac00a00e3b8a98623ff2a09a6c5b01109e3ecabbe82", 0x23, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1410.740756][T28255] bond2: (slave bridge1): Enslaving as an active interface with an up link [ 1410.750972][T28215] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 05:57:50 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:50 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x0, [{@empty}, {@multicast2}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {}, {@multicast2}, {@loopback}, {@loopback}, {@private}]}]}}}}}}}, 0x0) 05:57:50 executing program 4: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x10, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000220044944eeba71a4976e252922cb18f032e2aba000000012e0b3836005404b0e0301a4ce875f2e3b15f163ee340b7c59500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000000000004974000000000000097fc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e00190346431df019f29079bf786728", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x84ffde, 0x0) [ 1411.142506][T28281] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:57:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008e00)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000004380)="8c", 0x7ffff000}], 0x1}}], 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket(0x9, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x20040015) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) getsockname(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) [ 1411.266960][T28281] device team_slave_0 entered promiscuous mode [ 1411.273362][T28281] device team_slave_1 entered promiscuous mode [ 1411.282921][T28281] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1411.495304][T28281] device team_slave_0 left promiscuous mode [ 1411.501451][T28281] device team_slave_1 left promiscuous mode 05:57:50 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690add", 0x4}], 0x1, 0x1) r2 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r2, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x7, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f00000004c0), 0x80000002, r3}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@mark={{0x14, 0x1, 0x24, 0x2}}], 0x18}, 0x4000001) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200), 0xbcc4, r3}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0xfffd, 0x0) 05:57:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008e00)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000004380)="8c", 0x7ffff000}], 0x1}}], 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket(0x9, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x20040015) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) getsockname(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) 05:57:51 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690add", 0x4}], 0x1, 0x1) r2 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r2, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x7, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f00000004c0), 0x80000002, r3}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@mark={{0x14, 0x1, 0x24, 0x2}}], 0x18}, 0x4000001) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200), 0xbcc4, r3}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0xfffd, 0x0) 05:57:53 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:53 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690add", 0x4}], 0x1, 0x1) r2 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r2, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x7, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f00000004c0), 0x80000002, r3}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@mark={{0x14, 0x1, 0x24, 0x2}}], 0x18}, 0x4000001) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200), 0xbcc4, r3}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0xfffd, 0x0) 05:57:53 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf8, 0xf8, 0x5, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x8, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x115}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102393, 0xd82}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1414.005239][T28338] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1414.122827][T28338] device team_slave_0 entered promiscuous mode [ 1414.129223][T28338] device team_slave_1 entered promiscuous mode [ 1414.138609][T28338] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1414.218608][T28346] ptrace attach of "/root/syz-executor.2"[28345] was attempted by "/root/syz-executor.2"[28346] [ 1414.254386][T28338] device team_slave_0 left promiscuous mode [ 1414.260542][T28338] device team_slave_1 left promiscuous mode 05:57:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:53 executing program 4: 05:57:53 executing program 2: 05:57:53 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690add", 0x4}], 0x1, 0x1) r2 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r2, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x7, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f00000004c0), 0x80000002, r3}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@mark={{0x14, 0x1, 0x24, 0x2}}], 0x18}, 0x4000001) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200), 0xbcc4, r3}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0xfffd, 0x0) 05:57:54 executing program 2: 05:57:54 executing program 4: 05:57:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:54 executing program 0: 05:57:54 executing program 2: 05:57:54 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:54 executing program 4: 05:57:54 executing program 0: [ 1415.700287][T28377] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1415.734046][T28377] device team_slave_0 entered promiscuous mode [ 1415.740454][T28377] device team_slave_1 entered promiscuous mode [ 1415.750155][T28377] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1415.774178][T28377] device team_slave_0 left promiscuous mode [ 1415.780420][T28377] device team_slave_1 left promiscuous mode 05:57:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:56 executing program 0: 05:57:56 executing program 2: 05:57:56 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:57:56 executing program 4: [ 1417.776095][T28391] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1417.814627][T28391] device team_slave_0 entered promiscuous mode [ 1417.821072][T28391] device team_slave_1 entered promiscuous mode [ 1417.831329][T28391] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1417.844605][T28391] device team_slave_0 left promiscuous mode [ 1417.851054][T28391] device team_slave_1 left promiscuous mode 05:57:57 executing program 0: 05:57:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:57:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x1, 0x0, 0x1}, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x41) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) 05:57:57 executing program 4: pipe(&(0x7f0000000180)) socket$xdp(0x2c, 0x3, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_open_procfs(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) connect(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMBIS(r1, 0x5416, 0x0) ioctl$TIOCMIWAIT(r1, 0x5437, 0xfffffffe) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fe, &(0x7f0000000400)="96758a93330adf4390e32fa4513e6b0e2788dde237ed6d1c77cda27d7c5bc205b6e0c3adcb45a7cf87c9562196f79087bae17b8f93aadc1a6e8515de4c02a459b2f0dc93713e928bef64d994ee5042e1eeb34ea291d21bb01a847851d65b258a1677c6f55644b834de01ac383738634cc20639db4136271a544df43798c33edb16df58747643be76a0d756ac3decc53d30bf02b3631b940368d3468ab7ca15cfee5cfb") kexec_load(0x0, 0x6, &(0x7f0000000840)=[{&(0x7f0000000280)="509f54796b2eaf17cf5571de6e92fd8cca802c5c1dc3b7b2e8be91fdaaca996b6c395fef2bd1993293ab03a8637136176cffd9204f5544", 0x37}, {&(0x7f0000000580)="a90f9718f25b95997ddd1a42c2e57805e69494febe90ce19080e3424a9dfa741d5d90200be636058d3eab52c5f9fc8c0e3350d3ed4fd41f89f742fbf3794c68355bddaf61849524e", 0x48, 0x6}, {&(0x7f00000001c0), 0x0, 0x0, 0x4}, {&(0x7f0000000300), 0x0, 0x0, 0x4}, {&(0x7f0000000340)}, {0x0, 0x0, 0x0, 0x2}], 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f00000002c0)) 05:57:57 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000300)='./bus\x00', 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) socket$xdp(0x2c, 0x3, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_open_procfs(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) connect(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMBIS(r2, 0x5416, 0x0) ioctl$TIOCMIWAIT(r2, 0x5437, 0xfffffffe) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fe, &(0x7f0000000400)) syz_genetlink_get_family_id$ipvs(0x0) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) 05:57:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000040)="0fc47f420066b89b008ec8360f01c80f78ab980000000ffe2766b816010f00d8f42e0f78e20f30f2a7", 0x29}], 0x1, 0x7c, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:57:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x404000, 0x14) 05:58:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:58:00 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:00 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000007c0)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000340, 0x0, 0x0, 0x20000370, 0x200004ee], 0x0, 0x0, 0x0}, 0x4ca) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, 0x0, 0x4000001) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) clone(0xa9885700, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000080)) 05:58:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x404000, 0x14) 05:58:00 executing program 0: bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa10000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3b}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1420.912019][T28442] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1421.095312][T28442] device team_slave_0 entered promiscuous mode [ 1421.101689][T28442] device team_slave_1 entered promiscuous mode [ 1421.111055][T28442] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:58:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1421.355308][T28442] device team_slave_0 left promiscuous mode [ 1421.361435][T28442] device team_slave_1 left promiscuous mode 05:58:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:58:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) rmdir(&(0x7f0000000100)='./bus\x00') 05:58:00 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)="4227f9955517c96052ec15a97523ec34e5dd16c9b2174b10b49d7c14b2c4b158e19b980ae371e6d43692a1a1bb58c1f3", 0x30}, {0x0}, {&(0x7f0000000280)="d1934470453243241a2b008a14806fe3c1836f78b2d70120582e73f0553b7d1eb3481a7589e33e52c0d8fb0be9690e0c2d87eb690e859215d6954c8f3865bfb591bd427e0a08998f47d2dc7bd11dcbee234cff74b9b5d159ad0d3af3bdd0881447c700709dd0e58cda008de17a02026ecb521e46c61241019304afb86bb50b454b16c3e9bfc9969dad5e77e142a298b7e9dc3931c1b541d895e4b5", 0x9b}, {&(0x7f0000000100)}, {0x0}, {&(0x7f00000005c0)}], 0x6, 0x81805) msgget(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socket(0x11, 0xa, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x583840, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000340)={0x79, 0x0, [0x1, 0x2, 0x7, 0x100000001]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24002d00) 05:58:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @hci, @hci, @ethernet={0x0, @local}}) 05:58:01 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:02 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000300)='./bus\x00', 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) socket$nl_audit(0x10, 0x3, 0x9) syz_open_procfs(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) connect(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) ioctl$TIOCMIWAIT(r2, 0x5437, 0xfffffffe) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fe, &(0x7f0000000400)="96758a93330adf4390e32fa4513e6b0e2788dde237ed6d1c77cda27d7c5bc205b6e0c3adcb45a7cf87c9562196f79087bae17b8f93aadc1a6e8515de4c02a459b2f0dc93713e928b") kexec_load(0x0, 0x6, &(0x7f0000000840)=[{&(0x7f0000000280)="509f54796b2eaf17cf5571de6e92fd8cca802c5c1dc3b7b2e8be91fdaaca996b6c395fef2bd1993293ab03a8637136176cffd9204f5544", 0x37}, {&(0x7f0000000580)="a90f9718f25b95997ddd1a42c2e57805e69494febe90ce19080e3424a9dfa741d5d90200be636058d3eab52c5f9fc8c0e3350d3ed4fd41f89f742fbf3794c68355bddaf61849524e", 0x48, 0x6}, {&(0x7f00000001c0), 0x0, 0x0, 0x4}, {&(0x7f0000000300), 0x0, 0x0, 0x4}, {&(0x7f0000000340)}, {0x0, 0x0, 0x0, 0x2}], 0x0) syz_genetlink_get_family_id$ipvs(0x0) [ 1422.745828][T28501] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1422.768649][T28501] device team_slave_0 entered promiscuous mode [ 1422.775006][T28501] device team_slave_1 entered promiscuous mode [ 1422.784349][T28501] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:58:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r3 = dup2(r2, r2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x400c6615, 0x0) 05:58:02 executing program 4: [ 1422.988626][T28501] device team_slave_0 left promiscuous mode [ 1422.994647][T28501] device team_slave_1 left promiscuous mode [ 1423.246793][ C0] not chained 530000 origins [ 1423.251470][ C0] CPU: 0 PID: 24091 Comm: kworker/u4:10 Not tainted 5.8.0-rc5-syzkaller #0 [ 1423.260051][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1423.270129][ C0] Workqueue: krdsd rds_connect_worker [ 1423.275495][ C0] Call Trace: [ 1423.278776][ C0] [ 1423.281633][ C0] dump_stack+0x1df/0x240 [ 1423.285979][ C0] kmsan_internal_chain_origin+0x6f/0x130 [ 1423.291705][ C0] ? should_fail+0x72/0x9e0 [ 1423.296216][ C0] ? ret_from_fork+0x22/0x30 [ 1423.300809][ C0] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1423.306881][ C0] ? arch_stack_walk+0x34c/0x3e0 [ 1423.311824][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1423.317036][ C0] ? __should_failslab+0x1f6/0x290 [ 1423.322249][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 1423.327380][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1423.333210][ C0] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 1423.339400][ C0] ? tcp_parse_options+0x1ada/0x1b90 [ 1423.344761][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1423.350022][ C0] __msan_chain_origin+0x50/0x90 [ 1423.355003][ C0] tcp_conn_request+0x174b/0x4d10 [ 1423.360111][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1423.365352][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1423.370519][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1423.375580][ C0] ? inet6_sk_rx_dst_set+0x400/0x400 [ 1423.380888][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1423.386298][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1423.391505][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1423.397319][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1423.403446][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1423.408702][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1423.413334][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1423.417865][ C0] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 1423.424021][ C0] ? tcp_filter+0xf0/0xf0 [ 1423.428363][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1423.433855][ C0] ip_local_deliver+0x62a/0x7c0 [ 1423.438755][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 1423.443792][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 1423.449439][ C0] ip_rcv+0x6cf/0x750 [ 1423.453462][ C0] ? ip_rcv_core+0x12c0/0x12c0 [ 1423.458240][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 1423.463893][ C0] process_backlog+0xfb5/0x14e0 [ 1423.468813][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 1423.474121][ C0] net_rx_action+0x746/0x1aa0 [ 1423.478829][ C0] ? net_tx_action+0xc40/0xc40 [ 1423.483612][ C0] __do_softirq+0x311/0x83d [ 1423.488150][ C0] asm_call_on_stack+0x12/0x20 [ 1423.492910][ C0] [ 1423.495864][ C0] do_softirq_own_stack+0x7c/0xa0 [ 1423.500908][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 1423.506128][ C0] local_bh_enable+0x36/0x40 [ 1423.510739][ C0] ip_finish_output2+0x1fee/0x24a0 [ 1423.515861][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 1423.521911][ C0] __ip_finish_output+0xaa7/0xd80 [ 1423.526965][ C0] ip_finish_output+0x166/0x410 [ 1423.531836][ C0] ip_output+0x593/0x680 [ 1423.536126][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 1423.541436][ C0] ? ip_finish_output+0x410/0x410 [ 1423.546476][ C0] __ip_queue_xmit+0x1b5c/0x21a0 [ 1423.551420][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 1423.556970][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1423.562192][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1423.567409][ C0] ip_queue_xmit+0xcc/0xf0 [ 1423.571846][ C0] ? tcp_v4_fill_cb+0x580/0x580 [ 1423.576706][ C0] __tcp_transmit_skb+0x440e/0x6090 [ 1423.582096][ C0] tcp_connect+0x4208/0x6830 [ 1423.586701][ C0] ? __msan_poison_alloca+0xf0/0x120 [ 1423.592040][ C0] tcp_v4_connect+0x21fd/0x2370 [ 1423.596943][ C0] ? tcp_twsk_unique+0xba0/0xba0 [ 1423.601902][ C0] __inet_stream_connect+0x2fb/0x1340 [ 1423.607287][ C0] ? __local_bh_enable_ip+0x97/0x1d0 [ 1423.612602][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1423.617822][ C0] inet_stream_connect+0x101/0x180 [ 1423.622954][ C0] ? __inet_stream_connect+0x1340/0x1340 [ 1423.628607][ C0] rds_tcp_conn_path_connect+0x8a7/0xb70 [ 1423.634271][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1423.639491][ C0] ? rds_tcp_state_change+0x390/0x390 [ 1423.644872][ C0] rds_connect_worker+0x2a6/0x470 [ 1423.649912][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1423.655999][ C0] ? rds_addr_cmp+0x200/0x200 [ 1423.660686][ C0] process_one_work+0x1540/0x1f30 [ 1423.665745][ C0] worker_thread+0xed2/0x23f0 [ 1423.670437][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1423.676278][ C0] kthread+0x515/0x550 [ 1423.680357][ C0] ? process_one_work+0x1f30/0x1f30 [ 1423.685567][ C0] ? kthread_blkcg+0xf0/0xf0 [ 1423.690168][ C0] ret_from_fork+0x22/0x30 [ 1423.694599][ C0] Uninit was stored to memory at: [ 1423.699628][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1423.705353][ C0] __msan_chain_origin+0x50/0x90 [ 1423.710297][ C0] tcp_conn_request+0x1781/0x4d10 [ 1423.715323][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1423.720458][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1423.725488][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1423.730865][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1423.735472][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1423.739982][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1423.745453][ C0] ip_local_deliver+0x62a/0x7c0 [ 1423.750306][ C0] ip_rcv+0x6cf/0x750 [ 1423.754283][ C0] process_backlog+0xfb5/0x14e0 [ 1423.759131][ C0] net_rx_action+0x746/0x1aa0 [ 1423.763805][ C0] __do_softirq+0x311/0x83d [ 1423.768295][ C0] [ 1423.770615][ C0] Uninit was stored to memory at: [ 1423.775640][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1423.781355][ C0] __msan_chain_origin+0x50/0x90 [ 1423.786292][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 1423.791576][ C0] tcp_conn_request+0x33d7/0x4d10 [ 1423.796596][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1423.801705][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1423.806722][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1423.812093][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1423.816680][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1423.821184][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1423.826641][ C0] ip_local_deliver+0x62a/0x7c0 [ 1423.831489][ C0] ip_rcv+0x6cf/0x750 [ 1423.835469][ C0] process_backlog+0xfb5/0x14e0 [ 1423.840320][ C0] net_rx_action+0x746/0x1aa0 [ 1423.844997][ C0] __do_softirq+0x311/0x83d [ 1423.849488][ C0] [ 1423.851809][ C0] Uninit was stored to memory at: [ 1423.856862][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1423.862583][ C0] __msan_chain_origin+0x50/0x90 [ 1423.867535][ C0] tcp_conn_request+0x1781/0x4d10 [ 1423.872563][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1423.877670][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1423.882693][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1423.888066][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1423.892655][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1423.897158][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1423.902616][ C0] ip_local_deliver+0x62a/0x7c0 [ 1423.907466][ C0] ip_rcv+0x6cf/0x750 [ 1423.911444][ C0] process_backlog+0xfb5/0x14e0 [ 1423.916295][ C0] net_rx_action+0x746/0x1aa0 [ 1423.920967][ C0] __do_softirq+0x311/0x83d [ 1423.925452][ C0] [ 1423.927769][ C0] Uninit was stored to memory at: [ 1423.932798][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1423.938518][ C0] __msan_chain_origin+0x50/0x90 [ 1423.943454][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 1423.948764][ C0] tcp_conn_request+0x33d7/0x4d10 [ 1423.953798][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1423.958916][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1423.963942][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1423.969315][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1423.973906][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1423.978412][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1423.983875][ C0] ip_local_deliver+0x62a/0x7c0 [ 1423.988737][ C0] ip_rcv+0x6cf/0x750 [ 1423.992745][ C0] process_backlog+0xfb5/0x14e0 [ 1423.997600][ C0] net_rx_action+0x746/0x1aa0 [ 1424.002280][ C0] __do_softirq+0x311/0x83d [ 1424.006787][ C0] [ 1424.009117][ C0] Uninit was stored to memory at: [ 1424.014153][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1424.019870][ C0] __msan_chain_origin+0x50/0x90 [ 1424.024816][ C0] tcp_conn_request+0x1781/0x4d10 [ 1424.029842][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1424.034954][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1424.039975][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1424.045343][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1424.049931][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1424.054430][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1424.059885][ C0] ip_local_deliver+0x62a/0x7c0 [ 1424.064728][ C0] ip_rcv+0x6cf/0x750 [ 1424.068713][ C0] process_backlog+0xfb5/0x14e0 [ 1424.073558][ C0] net_rx_action+0x746/0x1aa0 [ 1424.078246][ C0] __do_softirq+0x311/0x83d [ 1424.082753][ C0] [ 1424.085079][ C0] Uninit was stored to memory at: [ 1424.090107][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1424.095821][ C0] __msan_chain_origin+0x50/0x90 [ 1424.100760][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 1424.106040][ C0] tcp_conn_request+0x33d7/0x4d10 [ 1424.111062][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1424.116168][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1424.121186][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1424.126557][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1424.131145][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1424.135647][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1424.141102][ C0] ip_local_deliver+0x62a/0x7c0 [ 1424.145949][ C0] ip_rcv+0x6cf/0x750 [ 1424.149928][ C0] process_backlog+0xfb5/0x14e0 [ 1424.154776][ C0] net_rx_action+0x746/0x1aa0 [ 1424.159453][ C0] __do_softirq+0x311/0x83d [ 1424.163944][ C0] [ 1424.166264][ C0] Uninit was stored to memory at: [ 1424.171303][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1424.177023][ C0] __msan_chain_origin+0x50/0x90 [ 1424.181960][ C0] tcp_conn_request+0x1781/0x4d10 [ 1424.186985][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1424.192107][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1424.197136][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1424.202506][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1424.207096][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1424.211597][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1424.217055][ C0] ip_local_deliver+0x62a/0x7c0 [ 1424.221907][ C0] ip_rcv+0x6cf/0x750 [ 1424.225889][ C0] process_backlog+0xfb5/0x14e0 [ 1424.230739][ C0] net_rx_action+0x746/0x1aa0 [ 1424.235413][ C0] __do_softirq+0x311/0x83d [ 1424.239901][ C0] [ 1424.242223][ C0] Uninit was created at: [ 1424.246471][ C0] kmsan_save_stack_with_flags+0x3c/0x90 [ 1424.252110][ C0] kmsan_alloc_page+0xb9/0x180 [ 1424.256876][ C0] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1424.262429][ C0] alloc_pages_current+0x672/0x990 [ 1424.267546][ C0] alloc_slab_page+0x122/0x1300 [ 1424.272394][ C0] new_slab+0x2bc/0x1130 [ 1424.276637][ C0] ___slab_alloc+0x14a3/0x2040 [ 1424.281414][ C0] kmem_cache_alloc+0xb23/0xd70 [ 1424.286281][ C0] inet_reqsk_alloc+0xac/0x830 [ 1424.291056][ C0] tcp_conn_request+0x753/0x4d10 [ 1424.296005][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1424.301125][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1424.306511][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1424.311102][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1424.315607][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1424.321066][ C0] ip_local_deliver+0x62a/0x7c0 [ 1424.325916][ C0] ip_sublist_rcv+0x125d/0x1450 [ 1424.330776][ C0] ip_list_rcv+0x904/0x970 [ 1424.335197][ C0] __netif_receive_skb_list_core+0x1459/0x14d0 [ 1424.341358][ C0] netif_receive_skb_list_internal+0xf66/0x1610 [ 1424.347601][ C0] napi_complete_done+0x439/0xe10 [ 1424.352626][ C0] virtqueue_napi_complete+0xb9/0x1f0 [ 1424.357997][ C0] virtnet_poll+0x1468/0x19f0 [ 1424.362677][ C0] net_rx_action+0x746/0x1aa0 [ 1424.367357][ C0] __do_softirq+0x311/0x83d 05:58:03 executing program 4: 05:58:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:58:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:58:04 executing program 4: 05:58:04 executing program 0: 05:58:04 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) dup(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:04 executing program 2: 05:58:04 executing program 4: [ 1425.368311][T28535] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000001140)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000001180)=[{r2, 0x40}], 0x1, &(0x7f00000001c0)={0x0, r3+60000000}, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xf51a0b8157a8ec83}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="64000000010a05000000000000000000050000070c000440000000000000000508000240000000000c0004400000000000000701080002400000000108000240000000010900010073797a31000000000c00044000000000000000050800024000000000"], 0x64}, 0x1, 0x0, 0x0, 0x2c004810}, 0xf8b37850b467fed) 05:58:04 executing program 2: socket(0x0, 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 05:58:04 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) dup(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeed, 0x0, @perf_bp={&(0x7f0000000100)}, 0x2080, 0x0, 0x9, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) exit_group(0x0) close(r0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) socket(0x840000000002, 0x3, 0x6) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000200)) sendmmsg(r0, &(0x7f0000006d00), 0x800000000000237, 0x1ffffffe) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@rand_addr=0x64010101, @local}, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) [ 1425.882661][T28545] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:05 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) dup(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1426.426535][T28559] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:58:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:58:07 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x9926b641089f3d10, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 05:58:07 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9443, 0x0, "0603eed014890000000000000000000000fc00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000640)={0x3, 0x0, 0x0, 0x0, 0x0, "000000f03e5a78710000000200000000a100"}) 05:58:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x2, &(0x7f00000001c0)=[{0x6c}, {0x6, 0x0, 0x0, 0x50000}]}) socket$inet_udp(0x2, 0x2, 0x0) 05:58:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1428.217090][T28572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:07 executing program 2: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x200, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0xfe51) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0xb13e7b37d9dfee48) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0xffffffffffffffff) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000180)={0x0, 0x2}) open(0x0, 0x0, 0x0) [ 1428.320980][T28572] device dummy0 entered promiscuous mode [ 1428.424458][T28572] device dummy0 left promiscuous mode 05:58:07 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000007, 0x12, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r2, r1, 0x0, 0x20000000000000d8) 05:58:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f000000c2c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) io_setup(0x202, &(0x7f00000004c0)) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="110000004200055d000000366ab1001000ed623c087dcbffa241ee19776b1d9ada6676c7517f97"], 0x14}}, 0x0) 05:58:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f000000c2c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) io_setup(0x202, &(0x7f00000004c0)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400)='nl80211\x00') sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="110000004200055d"], 0x14}}, 0x0) 05:58:08 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:08 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0x2, r2}) [ 1429.684346][T28614] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1429.770494][T28614] device dummy0 entered promiscuous mode [ 1429.861072][T28614] device dummy0 left promiscuous mode 05:58:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:58:10 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x9926b641089f3d10, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 05:58:10 executing program 4: ptrace(0x22, 0x0) 05:58:10 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:10 executing program 0: ptrace(0x21, 0x0) 05:58:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1431.575325][T28647] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:11 executing program 0: r0 = socket(0x18, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x11, 0x0, 0x0) r1 = socket(0x18, 0x3, 0x0) dup3(r0, r1, 0x0) 05:58:11 executing program 4: ptrace(0x14, 0x0) [ 1431.703030][T28647] device dummy0 entered promiscuous mode 05:58:11 executing program 2: ptrace(0x27, 0x0) [ 1431.802785][T28647] device dummy0 left promiscuous mode 05:58:11 executing program 4: ptrace(0xb, 0x0) 05:58:11 executing program 2: 05:58:11 executing program 0: 05:58:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:58:13 executing program 4: 05:58:13 executing program 2: 05:58:13 executing program 0: 05:58:13 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1434.735487][T28683] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1434.853441][T28683] device dummy0 entered promiscuous mode 05:58:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1434.953921][T28683] device dummy0 left promiscuous mode 05:58:14 executing program 0: 05:58:14 executing program 4: 05:58:14 executing program 2: 05:58:14 executing program 4: 05:58:14 executing program 0: [ 1436.140798][ C1] not chained 540000 origins [ 1436.145451][ C1] CPU: 1 PID: 24173 Comm: kworker/u4:30 Not tainted 5.8.0-rc5-syzkaller #0 [ 1436.154040][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1436.164115][ C1] Workqueue: krdsd rds_connect_worker [ 1436.169489][ C1] Call Trace: [ 1436.172775][ C1] [ 1436.175640][ C1] dump_stack+0x1df/0x240 [ 1436.179991][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 1436.185719][ C1] ? should_fail+0x72/0x9e0 [ 1436.190233][ C1] ? flat_init_apic_ldr+0x170/0x170 [ 1436.195451][ C1] ? lapic_next_event+0x6e/0xa0 [ 1436.200312][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1436.205528][ C1] ? __should_failslab+0x1f6/0x290 [ 1436.210652][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 1436.215809][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1436.221654][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 1436.227824][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 1436.233155][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1436.238370][ C1] __msan_chain_origin+0x50/0x90 [ 1436.243325][ C1] tcp_conn_request+0x174b/0x4d10 [ 1436.248412][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1436.254490][ C1] ? cache_from_obj+0x3d5/0x6b0 [ 1436.259349][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1436.264557][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1436.269777][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1436.274908][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1436.279951][ C1] ? inet6_sk_rx_dst_set+0x400/0x400 [ 1436.285244][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1436.290627][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1436.295836][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1436.301652][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1436.307724][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1436.312914][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1436.317497][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1436.322001][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 1436.328129][ C1] ? tcp_filter+0xf0/0xf0 [ 1436.332460][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1436.337936][ C1] ip_local_deliver+0x62a/0x7c0 [ 1436.342813][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 1436.347871][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 1436.353502][ C1] ip_rcv+0x6cf/0x750 [ 1436.357492][ C1] ? ip_rcv_core+0x12c0/0x12c0 [ 1436.362250][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 1436.367882][ C1] process_backlog+0xfb5/0x14e0 [ 1436.372736][ C1] ? lapic_next_event+0x6e/0xa0 [ 1436.377603][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 1436.382885][ C1] net_rx_action+0x746/0x1aa0 [ 1436.387597][ C1] ? net_tx_action+0xc40/0xc40 [ 1436.392369][ C1] __do_softirq+0x311/0x83d [ 1436.396897][ C1] asm_call_on_stack+0x12/0x20 [ 1436.401654][ C1] [ 1436.404594][ C1] do_softirq_own_stack+0x7c/0xa0 [ 1436.409636][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 1436.414839][ C1] local_bh_enable+0x36/0x40 [ 1436.419442][ C1] ip_finish_output2+0x1fee/0x24a0 [ 1436.424545][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 1436.430742][ C1] __ip_finish_output+0xaa7/0xd80 [ 1436.435790][ C1] ip_finish_output+0x166/0x410 [ 1436.440679][ C1] ip_output+0x593/0x680 [ 1436.444949][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 1436.450250][ C1] ? ip_finish_output+0x410/0x410 [ 1436.455309][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 1436.460258][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 1436.465874][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1436.471123][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1436.476338][ C1] ip_queue_xmit+0xcc/0xf0 [ 1436.480775][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 1436.485783][ C1] __tcp_transmit_skb+0x440e/0x6090 [ 1436.491061][ C1] tcp_connect+0x4208/0x6830 [ 1436.495787][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 1436.501237][ C1] tcp_v4_connect+0x21fd/0x2370 [ 1436.506148][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 1436.511106][ C1] __inet_stream_connect+0x2fb/0x1340 [ 1436.516495][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 1436.521807][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1436.527035][ C1] inet_stream_connect+0x101/0x180 [ 1436.532205][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 1436.537889][ C1] rds_tcp_conn_path_connect+0x8a7/0xb70 [ 1436.543534][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1436.548760][ C1] ? rds_tcp_state_change+0x390/0x390 [ 1436.554146][ C1] rds_connect_worker+0x2a6/0x470 [ 1436.559231][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1436.565328][ C1] ? rds_addr_cmp+0x200/0x200 [ 1436.570018][ C1] process_one_work+0x1540/0x1f30 [ 1436.575106][ C1] worker_thread+0xed2/0x23f0 [ 1436.579804][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1436.585645][ C1] kthread+0x515/0x550 [ 1436.589745][ C1] ? process_one_work+0x1f30/0x1f30 [ 1436.594970][ C1] ? kthread_blkcg+0xf0/0xf0 [ 1436.599607][ C1] ret_from_fork+0x22/0x30 [ 1436.604040][ C1] Uninit was stored to memory at: [ 1436.609109][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1436.614845][ C1] __msan_chain_origin+0x50/0x90 [ 1436.619892][ C1] tcp_conn_request+0x1781/0x4d10 [ 1436.624931][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1436.630041][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1436.635090][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1436.640467][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1436.645040][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1436.649534][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1436.654996][ C1] ip_local_deliver+0x62a/0x7c0 [ 1436.659853][ C1] ip_rcv+0x6cf/0x750 [ 1436.663829][ C1] process_backlog+0xfb5/0x14e0 [ 1436.668664][ C1] net_rx_action+0x746/0x1aa0 [ 1436.673353][ C1] __do_softirq+0x311/0x83d [ 1436.677844][ C1] [ 1436.680159][ C1] Uninit was stored to memory at: [ 1436.685228][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1436.690939][ C1] __msan_chain_origin+0x50/0x90 [ 1436.695890][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1436.701154][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1436.706170][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1436.711277][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1436.716302][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1436.721677][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1436.726260][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1436.730754][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1436.736205][ C1] ip_local_deliver+0x62a/0x7c0 [ 1436.741043][ C1] ip_rcv+0x6cf/0x750 [ 1436.745018][ C1] process_backlog+0xfb5/0x14e0 [ 1436.749860][ C1] net_rx_action+0x746/0x1aa0 [ 1436.754529][ C1] __do_softirq+0x311/0x83d [ 1436.759010][ C1] [ 1436.761332][ C1] Uninit was stored to memory at: [ 1436.766371][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1436.772096][ C1] __msan_chain_origin+0x50/0x90 [ 1436.777045][ C1] tcp_conn_request+0x1781/0x4d10 [ 1436.782053][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1436.787146][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1436.792170][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1436.797551][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1436.802138][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1436.806625][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1436.812076][ C1] ip_local_deliver+0x62a/0x7c0 [ 1436.816937][ C1] ip_rcv+0x6cf/0x750 [ 1436.820919][ C1] process_backlog+0xfb5/0x14e0 [ 1436.825765][ C1] net_rx_action+0x746/0x1aa0 [ 1436.830453][ C1] __do_softirq+0x311/0x83d [ 1436.834960][ C1] [ 1436.837286][ C1] Uninit was stored to memory at: [ 1436.842303][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1436.848042][ C1] __msan_chain_origin+0x50/0x90 [ 1436.852980][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1436.858281][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1436.863340][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1436.868459][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1436.873496][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1436.878880][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1436.883482][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1436.887986][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1436.893455][ C1] ip_local_deliver+0x62a/0x7c0 [ 1436.898329][ C1] ip_rcv+0x6cf/0x750 [ 1436.902308][ C1] process_backlog+0xfb5/0x14e0 [ 1436.907151][ C1] net_rx_action+0x746/0x1aa0 [ 1436.911825][ C1] __do_softirq+0x311/0x83d [ 1436.916313][ C1] [ 1436.918637][ C1] Uninit was stored to memory at: [ 1436.923648][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1436.929365][ C1] __msan_chain_origin+0x50/0x90 [ 1436.934303][ C1] tcp_conn_request+0x1781/0x4d10 [ 1436.939334][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1436.944450][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1436.949494][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1436.954882][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1436.959455][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1436.963954][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1436.969419][ C1] ip_local_deliver+0x62a/0x7c0 [ 1436.974267][ C1] ip_rcv+0x6cf/0x750 [ 1436.978269][ C1] process_backlog+0xfb5/0x14e0 [ 1436.983120][ C1] net_rx_action+0x746/0x1aa0 [ 1436.987808][ C1] __do_softirq+0x311/0x83d [ 1436.992291][ C1] [ 1436.994620][ C1] Uninit was stored to memory at: [ 1436.999664][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1437.005486][ C1] __msan_chain_origin+0x50/0x90 [ 1437.010438][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1437.015739][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1437.020765][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1437.025870][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1437.030892][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1437.036263][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1437.040851][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1437.045354][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1437.050813][ C1] ip_local_deliver+0x62a/0x7c0 [ 1437.055668][ C1] ip_rcv+0x6cf/0x750 [ 1437.059656][ C1] process_backlog+0xfb5/0x14e0 [ 1437.064510][ C1] net_rx_action+0x746/0x1aa0 [ 1437.069202][ C1] __do_softirq+0x311/0x83d [ 1437.073699][ C1] [ 1437.076012][ C1] Uninit was stored to memory at: [ 1437.081045][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1437.086762][ C1] __msan_chain_origin+0x50/0x90 [ 1437.091719][ C1] tcp_conn_request+0x1781/0x4d10 [ 1437.096745][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1437.101855][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1437.106894][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1437.112303][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1437.116918][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1437.121404][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1437.126867][ C1] ip_local_deliver+0x62a/0x7c0 [ 1437.131743][ C1] ip_rcv+0x6cf/0x750 [ 1437.135721][ C1] process_backlog+0xfb5/0x14e0 [ 1437.140569][ C1] net_rx_action+0x746/0x1aa0 [ 1437.145264][ C1] __do_softirq+0x311/0x83d [ 1437.149751][ C1] [ 1437.152077][ C1] Uninit was created at: [ 1437.156326][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 1437.161953][ C1] kmsan_alloc_page+0xb9/0x180 [ 1437.166707][ C1] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1437.172261][ C1] alloc_pages_current+0x672/0x990 [ 1437.177375][ C1] alloc_slab_page+0x122/0x1300 [ 1437.182227][ C1] new_slab+0x2bc/0x1130 [ 1437.186483][ C1] ___slab_alloc+0x14a3/0x2040 [ 1437.191253][ C1] kmem_cache_alloc+0xb23/0xd70 [ 1437.196109][ C1] inet_reqsk_alloc+0xac/0x830 [ 1437.200857][ C1] tcp_conn_request+0x753/0x4d10 [ 1437.205782][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1437.210897][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1437.216271][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1437.220870][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1437.225381][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1437.230845][ C1] ip_local_deliver+0x62a/0x7c0 [ 1437.235712][ C1] ip_sublist_rcv+0x125d/0x1450 [ 1437.240549][ C1] ip_list_rcv+0x904/0x970 [ 1437.244959][ C1] __netif_receive_skb_list_core+0x1459/0x14d0 [ 1437.251127][ C1] netif_receive_skb_list_internal+0xf66/0x1610 [ 1437.257383][ C1] napi_complete_done+0x439/0xe10 [ 1437.262408][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 1437.267769][ C1] virtnet_poll+0x1468/0x19f0 [ 1437.272451][ C1] net_rx_action+0x746/0x1aa0 [ 1437.277121][ C1] __do_softirq+0x311/0x83d 05:58:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:58:17 executing program 2: 05:58:17 executing program 4: 05:58:17 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:17 executing program 0: [ 1438.018590][T28720] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:17 executing program 4: [ 1438.178848][T28720] device dummy0 entered promiscuous mode [ 1438.247204][T28720] device dummy0 left promiscuous mode 05:58:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:58:17 executing program 0: 05:58:17 executing program 2: 05:58:17 executing program 4: 05:58:17 executing program 0: 05:58:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x8) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) 05:58:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:58:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) select(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x7f}, 0x0) shutdown(r0, 0x0) 05:58:20 executing program 4: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00007a8000)) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100060, 0xffffa88f) 05:58:20 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 05:58:20 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1441.208766][T28755] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1441.314719][T28755] device dummy0 entered promiscuous mode 05:58:20 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) [ 1441.384977][T28755] device dummy0 left promiscuous mode 05:58:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:58:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000280)) exit_group(0x0) mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x100000e, 0x400002172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) 05:58:21 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') getdents64(r0, 0x0, 0x0) 05:58:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000000)={'gre0\x00', &(0x7f0000000040)={'gretap0\x00', 0x0, 0x0, 0x1, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @dev}}}}) 05:58:21 executing program 2: socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f00000002c0)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000240)=[{0x0}], 0x1, &(0x7f0000000400)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@ssrr={0x89, 0xb, 0x59, [@loopback, @rand_addr]}]}}}], 0x20}}], 0x1, 0x0) 05:58:21 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1442.714684][T28801] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1442.752218][T28801] device dummy0 entered promiscuous mode [ 1442.772395][T28801] device dummy0 left promiscuous mode 05:58:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:58:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/route\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x4000000000dc) 05:58:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x4, 0x300, 0x98, 0x198, 0x198, 0xc8, 0x98, 0x238, 0x268, 0x268, 0x268, 0x238, 0x4, 0x0, {[{{@ip={@empty, @remote, 0x0, 0x0, 'bond_slave_1\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, [@common=@unspec=@connbytes={{0x38, 'connbytes\x00'}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) 05:58:23 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:23 executing program 2: socket(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) [ 1444.332304][T28818] x_tables: duplicate underflow at hook 2 [ 1444.334841][T28816] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1444.457500][T28816] device team_slave_0 entered promiscuous mode [ 1444.463888][T28816] device team_slave_1 entered promiscuous mode [ 1444.473341][T28816] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:58:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) [ 1444.544289][T28816] device team_slave_0 left promiscuous mode [ 1444.550470][T28816] device team_slave_1 left promiscuous mode 05:58:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:58:24 executing program 4: mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) 05:58:24 executing program 4: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='net/route\x00') bind$packet(0xffffffffffffffff, &(0x7f0000000000), 0x14) bind$packet(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 1445.345595][T28822] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 1445.382794][T28822] device ipvlan1 entered promiscuous mode 05:58:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="7c000000000119050000000000000000000000003c0001002c00010014000300000000000200000000b700000000080114000400fe800000000000000000f0ffffffffba0c000200050001002f000000240002000c000200050001002f00040014000100080001000000e40c4b159b3a91470001080007"], 0x7c}}, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x50, 0x3, 0x1, 0x80b, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}]}, 0x50}}, 0x0) 05:58:24 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000140)={0x8f918ad2bcd1a544}) [ 1445.825795][T28859] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1445.898878][T28859] device team_slave_0 entered promiscuous mode [ 1445.905282][T28859] device team_slave_1 entered promiscuous mode [ 1445.914629][T28859] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1446.069831][T28859] device team_slave_0 left promiscuous mode [ 1446.075867][T28859] device team_slave_1 left promiscuous mode 05:58:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') getdents64(r0, &(0x7f00000000c0)=""/247, 0xf7) 05:58:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:58:26 executing program 2: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0x0, 0x100000000}) 05:58:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000100), 0xc, &(0x7f0000000880)={0x0, 0x3c}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 05:58:26 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:26 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, 0x0) [ 1447.515262][T28878] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1447.606168][T28878] device team_slave_0 entered promiscuous mode [ 1447.612573][T28878] device team_slave_1 entered promiscuous mode [ 1447.621901][T28878] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1447.782401][T28878] device team_slave_0 left promiscuous mode [ 1447.788613][T28878] device team_slave_1 left promiscuous mode 05:58:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 05:58:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000001440)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:58:27 executing program 2: clone(0x2182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000980)=@nat={'nat\x00', 0x1b, 0x5, 0x518, 0x378, 0x118, 0xffffffff, 0x378, 0x378, 0x448, 0x448, 0xffffffff, 0x448, 0x448, 0x5, 0x0, {[{{@ipv6={@mcast2, @remote, [], [], 'team0\x00', 'bridge0\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@private, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x378}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@ipv6={@private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [], [], 'syzkaller0\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) [ 1448.489025][T28905] x_tables: duplicate underflow at hook 1 05:58:28 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 05:58:28 executing program 0: 05:58:28 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:28 executing program 2: clone(0x2182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000980)=@nat={'nat\x00', 0x1b, 0x5, 0x518, 0x378, 0x118, 0xffffffff, 0x378, 0x378, 0x448, 0x448, 0xffffffff, 0x448, 0x448, 0x5, 0x0, {[{{@ipv6={@mcast2, @remote, [], [], 'team0\x00', 'bridge0\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@private, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x378}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@ipv6={@private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [], [], 'syzkaller0\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) [ 1449.094128][T28918] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1449.183383][T28918] device dummy0 entered promiscuous mode [ 1449.187497][T28924] x_tables: duplicate underflow at hook 1 [ 1449.246043][T28918] device dummy0 left promiscuous mode [ 1450.301438][ C1] not chained 550000 origins [ 1450.306093][ C1] CPU: 1 PID: 24103 Comm: kworker/u4:13 Not tainted 5.8.0-rc5-syzkaller #0 [ 1450.314692][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1450.324785][ C1] Workqueue: krdsd rds_tcp_accept_worker [ 1450.330421][ C1] Call Trace: [ 1450.333712][ C1] [ 1450.336579][ C1] dump_stack+0x1df/0x240 [ 1450.340922][ C1] ? tcp_v4_do_rcv+0xb0f/0xd70 [ 1450.345699][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 1450.351431][ C1] ? local_bh_enable+0x36/0x40 [ 1450.356224][ C1] ? ip_finish_output2+0x1fee/0x24a0 [ 1450.361519][ C1] ? __ip_finish_output+0xaa7/0xd80 [ 1450.366744][ C1] ? ip_finish_output+0x166/0x410 [ 1450.371786][ C1] ? ip_output+0x593/0x680 [ 1450.376208][ C1] ? __ip_queue_xmit+0x1b5c/0x21a0 [ 1450.381331][ C1] ? ip_queue_xmit+0xcc/0xf0 [ 1450.385930][ C1] ? __tcp_transmit_skb+0x440e/0x6090 [ 1450.391307][ C1] ? tcp_write_xmit+0x30b1/0xb430 [ 1450.396351][ C1] ? __tcp_push_pending_frames+0x124/0x4e0 [ 1450.402163][ C1] ? tcp_send_fin+0x131e/0x1570 [ 1450.407019][ C1] ? tcp_shutdown+0x188/0x200 [ 1450.411701][ C1] ? inet_shutdown+0x342/0x5e0 [ 1450.416466][ C1] ? kernel_sock_shutdown+0x9d/0xc0 [ 1450.421671][ C1] ? rds_tcp_accept_one+0xe18/0x1060 [ 1450.426961][ C1] ? rds_tcp_accept_worker+0x61/0x160 [ 1450.432339][ C1] ? process_one_work+0x1540/0x1f30 [ 1450.437537][ C1] ? worker_thread+0xed2/0x23f0 [ 1450.442392][ C1] ? kthread+0x515/0x550 [ 1450.446632][ C1] ? ret_from_fork+0x22/0x30 [ 1450.451224][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1450.456428][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1450.462242][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1450.468311][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1450.473516][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1450.479325][ C1] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1450.485480][ C1] ? __msan_get_context_state+0x9/0x20 [ 1450.490940][ C1] ? __module_get+0x19/0x230 [ 1450.495539][ C1] ? inet_twsk_alloc+0x7bb/0xba0 [ 1450.500510][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1450.505711][ C1] __msan_chain_origin+0x50/0x90 [ 1450.510658][ C1] tcp_time_wait+0xb7e/0x10b0 [ 1450.515356][ C1] tcp_fin+0x1f9/0x890 [ 1450.519433][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1450.524306][ C1] ? tcp_urg+0x8e1/0xde0 [ 1450.528576][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1450.534048][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1450.539879][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1450.545102][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1450.549715][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1450.554222][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 1450.560323][ C1] ? tcp_v4_rcv+0x1531/0x5040 [ 1450.565025][ C1] ? tcp_filter+0xf0/0xf0 [ 1450.569356][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1450.574831][ C1] ip_local_deliver+0x62a/0x7c0 [ 1450.579708][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 1450.584747][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 1450.590382][ C1] ip_rcv+0x6cf/0x750 [ 1450.594376][ C1] ? ip_rcv_core+0x12c0/0x12c0 [ 1450.599140][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 1450.604776][ C1] process_backlog+0xfb5/0x14e0 [ 1450.609641][ C1] ? lapic_next_event+0x6e/0xa0 [ 1450.614520][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 1450.619806][ C1] net_rx_action+0x746/0x1aa0 [ 1450.624534][ C1] ? net_tx_action+0xc40/0xc40 [ 1450.629310][ C1] __do_softirq+0x311/0x83d [ 1450.633837][ C1] asm_call_on_stack+0x12/0x20 [ 1450.638593][ C1] [ 1450.641581][ C1] do_softirq_own_stack+0x7c/0xa0 [ 1450.646631][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 1450.651849][ C1] local_bh_enable+0x36/0x40 [ 1450.656446][ C1] ip_finish_output2+0x1fee/0x24a0 [ 1450.661593][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 1450.667611][ C1] __ip_finish_output+0xaa7/0xd80 [ 1450.672675][ C1] ip_finish_output+0x166/0x410 [ 1450.677570][ C1] ip_output+0x593/0x680 [ 1450.681838][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 1450.687129][ C1] ? ip_finish_output+0x410/0x410 [ 1450.692158][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 1450.697114][ C1] ? sysvec_apic_timer_interrupt+0x11e/0x130 [ 1450.703116][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1450.708325][ C1] ip_queue_xmit+0xcc/0xf0 [ 1450.712753][ C1] ? tcp_v6_send_response+0x2920/0x2920 [ 1450.718303][ C1] __tcp_transmit_skb+0x440e/0x6090 [ 1450.723558][ C1] tcp_write_xmit+0x30b1/0xb430 [ 1450.728521][ C1] __tcp_push_pending_frames+0x124/0x4e0 [ 1450.734171][ C1] tcp_send_fin+0x131e/0x1570 [ 1450.738871][ C1] tcp_shutdown+0x188/0x200 [ 1450.743391][ C1] ? tcp_set_state+0x9d0/0x9d0 [ 1450.748173][ C1] inet_shutdown+0x342/0x5e0 [ 1450.752781][ C1] ? inet_recvmsg+0x7d0/0x7d0 [ 1450.757469][ C1] kernel_sock_shutdown+0x9d/0xc0 [ 1450.762631][ C1] rds_tcp_accept_one+0xe18/0x1060 [ 1450.767771][ C1] rds_tcp_accept_worker+0x61/0x160 [ 1450.772982][ C1] ? rds_tcp_exit_net+0xcc0/0xcc0 [ 1450.778015][ C1] process_one_work+0x1540/0x1f30 [ 1450.783082][ C1] worker_thread+0xed2/0x23f0 [ 1450.787771][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1450.793609][ C1] kthread+0x515/0x550 [ 1450.797685][ C1] ? process_one_work+0x1f30/0x1f30 [ 1450.802894][ C1] ? kthread_blkcg+0xf0/0xf0 [ 1450.807489][ C1] ret_from_fork+0x22/0x30 [ 1450.811931][ C1] Uninit was stored to memory at: [ 1450.816978][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1450.822695][ C1] __msan_chain_origin+0x50/0x90 [ 1450.827633][ C1] inet_twsk_alloc+0xab6/0xba0 [ 1450.832396][ C1] tcp_time_wait+0xcd/0x10b0 [ 1450.836998][ C1] tcp_fin+0x1f9/0x890 [ 1450.841067][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1450.845920][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1450.851395][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1450.855998][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1450.860520][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1450.865985][ C1] ip_local_deliver+0x62a/0x7c0 [ 1450.870843][ C1] ip_rcv+0x6cf/0x750 [ 1450.874827][ C1] process_backlog+0xfb5/0x14e0 [ 1450.879686][ C1] net_rx_action+0x746/0x1aa0 [ 1450.884377][ C1] __do_softirq+0x311/0x83d [ 1450.888907][ C1] [ 1450.891237][ C1] Uninit was stored to memory at: [ 1450.896282][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1450.902050][ C1] __msan_chain_origin+0x50/0x90 [ 1450.907015][ C1] __inet_twsk_schedule+0x24e/0x2c0 [ 1450.912228][ C1] tcp_time_wait+0xaca/0x10b0 [ 1450.916925][ C1] tcp_fin+0x1f9/0x890 [ 1450.921004][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1450.925865][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1450.931359][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1450.935960][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1450.940497][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1450.945956][ C1] ip_local_deliver+0x62a/0x7c0 [ 1450.950807][ C1] ip_rcv+0x6cf/0x750 [ 1450.954789][ C1] process_backlog+0xfb5/0x14e0 [ 1450.959644][ C1] net_rx_action+0x746/0x1aa0 [ 1450.964324][ C1] __do_softirq+0x311/0x83d [ 1450.968813][ C1] [ 1450.971131][ C1] Uninit was stored to memory at: [ 1450.976160][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1450.981880][ C1] __msan_chain_origin+0x50/0x90 [ 1450.986833][ C1] tcp_time_wait+0xb7e/0x10b0 [ 1450.991521][ C1] tcp_fin+0x1f9/0x890 [ 1450.995588][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1451.000441][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1451.005898][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1451.010493][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1451.015002][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1451.020465][ C1] ip_local_deliver+0x62a/0x7c0 [ 1451.025311][ C1] ip_rcv+0x6cf/0x750 [ 1451.029310][ C1] process_backlog+0xfb5/0x14e0 [ 1451.034168][ C1] net_rx_action+0x746/0x1aa0 [ 1451.038841][ C1] __do_softirq+0x311/0x83d [ 1451.043333][ C1] [ 1451.045666][ C1] Uninit was stored to memory at: [ 1451.050697][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1451.056413][ C1] __msan_chain_origin+0x50/0x90 [ 1451.061354][ C1] inet_twsk_alloc+0xab6/0xba0 [ 1451.066117][ C1] tcp_time_wait+0xcd/0x10b0 [ 1451.070706][ C1] tcp_fin+0x1f9/0x890 [ 1451.074771][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1451.079619][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1451.085075][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1451.089665][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1451.094164][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1451.099621][ C1] ip_local_deliver+0x62a/0x7c0 [ 1451.104494][ C1] ip_rcv+0x6cf/0x750 [ 1451.108476][ C1] process_backlog+0xfb5/0x14e0 [ 1451.113331][ C1] net_rx_action+0x746/0x1aa0 [ 1451.118008][ C1] __do_softirq+0x311/0x83d [ 1451.122497][ C1] [ 1451.124813][ C1] Uninit was stored to memory at: [ 1451.129837][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1451.135559][ C1] __msan_chain_origin+0x50/0x90 [ 1451.140495][ C1] __inet_twsk_schedule+0x24e/0x2c0 [ 1451.145693][ C1] tcp_time_wait+0xaca/0x10b0 [ 1451.150365][ C1] tcp_fin+0x1f9/0x890 [ 1451.154433][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1451.159278][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1451.164737][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1451.169331][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1451.173834][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1451.179292][ C1] ip_local_deliver+0x62a/0x7c0 [ 1451.184146][ C1] ip_rcv+0x6cf/0x750 [ 1451.188149][ C1] process_backlog+0xfb5/0x14e0 [ 1451.193013][ C1] net_rx_action+0x746/0x1aa0 [ 1451.197691][ C1] __do_softirq+0x311/0x83d [ 1451.202197][ C1] [ 1451.204516][ C1] Uninit was stored to memory at: [ 1451.209541][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1451.215264][ C1] __msan_chain_origin+0x50/0x90 [ 1451.220203][ C1] tcp_time_wait+0xb7e/0x10b0 [ 1451.224895][ C1] tcp_fin+0x1f9/0x890 [ 1451.228961][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1451.233812][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1451.239296][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1451.243895][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1451.248406][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1451.253870][ C1] ip_local_deliver+0x62a/0x7c0 [ 1451.258720][ C1] ip_rcv+0x6cf/0x750 [ 1451.262702][ C1] process_backlog+0xfb5/0x14e0 [ 1451.267552][ C1] net_rx_action+0x746/0x1aa0 [ 1451.272226][ C1] __do_softirq+0x311/0x83d [ 1451.276715][ C1] [ 1451.279054][ C1] Uninit was stored to memory at: [ 1451.284085][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1451.289804][ C1] __msan_chain_origin+0x50/0x90 [ 1451.294741][ C1] inet_twsk_alloc+0xab6/0xba0 [ 1451.299504][ C1] tcp_time_wait+0xcd/0x10b0 [ 1451.304090][ C1] tcp_fin+0x1f9/0x890 [ 1451.308154][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1451.313002][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1451.318456][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1451.323046][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1451.327549][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1451.333006][ C1] ip_local_deliver+0x62a/0x7c0 [ 1451.337853][ C1] ip_rcv+0x6cf/0x750 [ 1451.341837][ C1] process_backlog+0xfb5/0x14e0 [ 1451.346689][ C1] net_rx_action+0x746/0x1aa0 [ 1451.351361][ C1] __do_softirq+0x311/0x83d [ 1451.355879][ C1] [ 1451.358198][ C1] Uninit was created at: [ 1451.362451][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 1451.368081][ C1] kmsan_alloc_page+0xb9/0x180 [ 1451.372845][ C1] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1451.378387][ C1] alloc_pages_current+0x672/0x990 [ 1451.383496][ C1] alloc_slab_page+0x122/0x1300 [ 1451.388346][ C1] new_slab+0x2bc/0x1130 [ 1451.392590][ C1] ___slab_alloc+0x14a3/0x2040 [ 1451.397360][ C1] kmem_cache_alloc+0xb23/0xd70 [ 1451.402219][ C1] inet_twsk_alloc+0x135/0xba0 [ 1451.406984][ C1] tcp_time_wait+0xcd/0x10b0 [ 1451.411571][ C1] tcp_fin+0x1f9/0x890 [ 1451.415636][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1451.420501][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1451.425971][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1451.430586][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1451.435098][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1451.440585][ C1] ip_local_deliver+0x62a/0x7c0 [ 1451.445441][ C1] ip_rcv+0x6cf/0x750 [ 1451.449431][ C1] process_backlog+0xfb5/0x14e0 [ 1451.454289][ C1] net_rx_action+0x746/0x1aa0 [ 1451.458970][ C1] __do_softirq+0x311/0x83d 05:58:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:58:30 executing program 0: 05:58:30 executing program 4: 05:58:30 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:30 executing program 2: 05:58:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 1451.782953][T28942] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:31 executing program 0: [ 1451.876504][T28942] device dummy0 entered promiscuous mode 05:58:31 executing program 4: 05:58:31 executing program 2: [ 1451.966312][T28942] device dummy0 left promiscuous mode 05:58:31 executing program 4: 05:58:31 executing program 0: 05:58:31 executing program 2: 05:58:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 05:58:34 executing program 4: 05:58:34 executing program 2: 05:58:34 executing program 0: 05:58:34 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f7646", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 1454.976573][T28970] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:34 executing program 0: 05:58:34 executing program 4: [ 1455.129108][T28970] device dummy0 entered promiscuous mode 05:58:34 executing program 2: [ 1455.209425][T28970] device dummy0 left promiscuous mode 05:58:34 executing program 4: 05:58:34 executing program 0: 05:58:34 executing program 2: 05:58:37 executing program 0: 05:58:37 executing program 4: 05:58:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 05:58:37 executing program 3: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:37 executing program 2: [ 1458.094520][T29001] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1458.185200][T29001] device team_slave_0 entered promiscuous mode [ 1458.191586][T29001] device team_slave_1 entered promiscuous mode [ 1458.201017][T29001] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1458.265201][T29001] device team_slave_0 left promiscuous mode [ 1458.271439][T29001] device team_slave_1 left promiscuous mode 05:58:37 executing program 0: 05:58:37 executing program 1: 05:58:37 executing program 4: 05:58:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8138ae83, &(0x7f0000000400)) 05:58:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000200)='X', 0x1, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) socket$packet(0x11, 0x0, 0x300) 05:58:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1, 0x803, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:58:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xc0902, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) write$tun(r0, &(0x7f00000002c0)={@void, @val={0x1, 0x3, 0x0, 0x5}, @mpls={[], @ipv4=@gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x4, 0x0, @rand_addr, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x0, 0x0, 0x0, 0x0, 0x8}}}}}, 0x62) 05:58:38 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/160, 0xa0}], 0x1, 0x0) [ 1459.483998][T29034] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1459.491807][T29034] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1459.664803][T29034] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1459.888823][T29034] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1459.952932][T29034] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1460.927773][ C0] not chained 560000 origins [ 1460.932404][ C0] CPU: 0 PID: 24163 Comm: kworker/u4:28 Not tainted 5.8.0-rc5-syzkaller #0 [ 1460.940980][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.951028][ C0] Workqueue: krdsd rds_connect_worker [ 1460.956422][ C0] Call Trace: [ 1460.959690][ C0] [ 1460.962530][ C0] dump_stack+0x1df/0x240 [ 1460.966852][ C0] kmsan_internal_chain_origin+0x6f/0x130 [ 1460.972582][ C0] ? xfrm_lookup_route+0x2c1/0x370 [ 1460.977697][ C0] ? ip_route_output_flow+0x35a/0x3d0 [ 1460.983067][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1460.988251][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1460.993437][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1460.999242][ C0] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1461.005392][ C0] ? tcp_select_initial_window+0x60d/0x6c0 [ 1461.011204][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1461.016400][ C0] __msan_chain_origin+0x50/0x90 [ 1461.021327][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 1461.026612][ C0] tcp_conn_request+0x33d7/0x4d10 [ 1461.031665][ C0] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1461.037717][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1461.042899][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1461.048101][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1461.053201][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1461.058209][ C0] ? inet6_sk_rx_dst_set+0x400/0x400 [ 1461.063492][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1461.068847][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1461.074030][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1461.079817][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1461.085905][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1461.091094][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1461.095685][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1461.100170][ C0] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 1461.106268][ C0] ? tcp_filter+0xf0/0xf0 [ 1461.110582][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1461.116035][ C0] ip_local_deliver+0x62a/0x7c0 [ 1461.120881][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 1461.125907][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 1461.131548][ C0] ip_rcv+0x6cf/0x750 [ 1461.135551][ C0] ? ip_rcv_core+0x12c0/0x12c0 [ 1461.140322][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 1461.145996][ C0] process_backlog+0xfb5/0x14e0 [ 1461.150889][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 1461.156182][ C0] net_rx_action+0x746/0x1aa0 [ 1461.160891][ C0] ? net_tx_action+0xc40/0xc40 [ 1461.165675][ C0] __do_softirq+0x311/0x83d [ 1461.170225][ C0] asm_call_on_stack+0x12/0x20 [ 1461.174987][ C0] [ 1461.177932][ C0] do_softirq_own_stack+0x7c/0xa0 [ 1461.182971][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 1461.188178][ C0] local_bh_enable+0x36/0x40 [ 1461.192769][ C0] ip_finish_output2+0x1fee/0x24a0 [ 1461.197905][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 1461.203917][ C0] __ip_finish_output+0xaa7/0xd80 [ 1461.208964][ C0] ip_finish_output+0x166/0x410 [ 1461.213832][ C0] ip_output+0x593/0x680 [ 1461.218096][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 1461.223389][ C0] ? ip_finish_output+0x410/0x410 [ 1461.228413][ C0] __ip_queue_xmit+0x1b5c/0x21a0 [ 1461.233357][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 1461.238919][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1461.244148][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1461.249711][ C0] ip_queue_xmit+0xcc/0xf0 [ 1461.254148][ C0] ? tcp_v4_fill_cb+0x580/0x580 [ 1461.259013][ C0] __tcp_transmit_skb+0x440e/0x6090 [ 1461.264261][ C0] tcp_connect+0x4208/0x6830 [ 1461.268860][ C0] ? __msan_poison_alloca+0xf0/0x120 [ 1461.274188][ C0] tcp_v4_connect+0x21fd/0x2370 [ 1461.279082][ C0] ? tcp_twsk_unique+0xba0/0xba0 [ 1461.284030][ C0] __inet_stream_connect+0x2fb/0x1340 [ 1461.289410][ C0] ? __local_bh_enable_ip+0x97/0x1d0 [ 1461.294727][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1461.299939][ C0] inet_stream_connect+0x101/0x180 [ 1461.305057][ C0] ? __inet_stream_connect+0x1340/0x1340 [ 1461.310702][ C0] rds_tcp_conn_path_connect+0x8a7/0xb70 [ 1461.316353][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 1461.321563][ C0] ? rds_tcp_state_change+0x390/0x390 [ 1461.326942][ C0] rds_connect_worker+0x2a6/0x470 [ 1461.331972][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1461.338049][ C0] ? rds_addr_cmp+0x200/0x200 [ 1461.342734][ C0] process_one_work+0x1540/0x1f30 [ 1461.347799][ C0] worker_thread+0xed2/0x23f0 [ 1461.352490][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1461.358323][ C0] kthread+0x515/0x550 [ 1461.362412][ C0] ? process_one_work+0x1f30/0x1f30 [ 1461.367616][ C0] ? kthread_blkcg+0xf0/0xf0 [ 1461.372213][ C0] ret_from_fork+0x22/0x30 [ 1461.376638][ C0] Uninit was stored to memory at: [ 1461.381672][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1461.387393][ C0] __msan_chain_origin+0x50/0x90 [ 1461.392333][ C0] tcp_conn_request+0x1781/0x4d10 [ 1461.397358][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1461.402497][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1461.407545][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1461.412920][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1461.417512][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1461.422020][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1461.427476][ C0] ip_local_deliver+0x62a/0x7c0 [ 1461.432322][ C0] ip_rcv+0x6cf/0x750 [ 1461.436304][ C0] process_backlog+0xfb5/0x14e0 [ 1461.441172][ C0] net_rx_action+0x746/0x1aa0 [ 1461.445848][ C0] __do_softirq+0x311/0x83d [ 1461.450341][ C0] [ 1461.452662][ C0] Uninit was stored to memory at: [ 1461.457686][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1461.463405][ C0] __msan_chain_origin+0x50/0x90 [ 1461.468341][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 1461.473631][ C0] tcp_conn_request+0x33d7/0x4d10 [ 1461.478672][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1461.483789][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1461.488816][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1461.494202][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1461.498792][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1461.503293][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1461.508751][ C0] ip_local_deliver+0x62a/0x7c0 [ 1461.513621][ C0] ip_rcv+0x6cf/0x750 [ 1461.517610][ C0] process_backlog+0xfb5/0x14e0 [ 1461.522456][ C0] net_rx_action+0x746/0x1aa0 [ 1461.527127][ C0] __do_softirq+0x311/0x83d [ 1461.531616][ C0] [ 1461.533936][ C0] Uninit was stored to memory at: [ 1461.538961][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1461.544678][ C0] __msan_chain_origin+0x50/0x90 [ 1461.549613][ C0] tcp_conn_request+0x1781/0x4d10 [ 1461.554636][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1461.559763][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1461.564787][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1461.570156][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1461.574757][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1461.579268][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1461.584753][ C0] ip_local_deliver+0x62a/0x7c0 [ 1461.589604][ C0] ip_rcv+0x6cf/0x750 [ 1461.593588][ C0] process_backlog+0xfb5/0x14e0 [ 1461.598437][ C0] net_rx_action+0x746/0x1aa0 [ 1461.603141][ C0] __do_softirq+0x311/0x83d [ 1461.607635][ C0] [ 1461.609954][ C0] Uninit was stored to memory at: [ 1461.615003][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1461.620747][ C0] __msan_chain_origin+0x50/0x90 [ 1461.625704][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 1461.630996][ C0] tcp_conn_request+0x33d7/0x4d10 [ 1461.636030][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1461.641162][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1461.646212][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1461.651609][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1461.656209][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1461.660719][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1461.666183][ C0] ip_local_deliver+0x62a/0x7c0 [ 1461.671037][ C0] ip_rcv+0x6cf/0x750 [ 1461.675020][ C0] process_backlog+0xfb5/0x14e0 [ 1461.679897][ C0] net_rx_action+0x746/0x1aa0 [ 1461.684573][ C0] __do_softirq+0x311/0x83d [ 1461.689147][ C0] [ 1461.691466][ C0] Uninit was stored to memory at: [ 1461.696492][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1461.702208][ C0] __msan_chain_origin+0x50/0x90 [ 1461.707164][ C0] tcp_conn_request+0x1781/0x4d10 [ 1461.712190][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1461.717310][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1461.722342][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1461.727731][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1461.732324][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1461.736838][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1461.742334][ C0] ip_local_deliver+0x62a/0x7c0 [ 1461.747211][ C0] ip_rcv+0x6cf/0x750 [ 1461.751226][ C0] process_backlog+0xfb5/0x14e0 [ 1461.756095][ C0] net_rx_action+0x746/0x1aa0 [ 1461.760790][ C0] __do_softirq+0x311/0x83d [ 1461.765311][ C0] [ 1461.767637][ C0] Uninit was stored to memory at: [ 1461.772677][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1461.778414][ C0] __msan_chain_origin+0x50/0x90 [ 1461.783371][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 1461.788691][ C0] tcp_conn_request+0x33d7/0x4d10 [ 1461.793732][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1461.798859][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1461.803892][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1461.809276][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1461.813874][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1461.818400][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1461.823862][ C0] ip_local_deliver+0x62a/0x7c0 [ 1461.828713][ C0] ip_rcv+0x6cf/0x750 [ 1461.832701][ C0] process_backlog+0xfb5/0x14e0 [ 1461.837550][ C0] net_rx_action+0x746/0x1aa0 [ 1461.842224][ C0] __do_softirq+0x311/0x83d [ 1461.846712][ C0] [ 1461.849030][ C0] Uninit was stored to memory at: [ 1461.854059][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 1461.859793][ C0] __msan_chain_origin+0x50/0x90 [ 1461.864731][ C0] tcp_conn_request+0x1781/0x4d10 [ 1461.869756][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1461.874868][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 1461.879918][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1461.885288][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1461.889874][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1461.894380][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1461.899841][ C0] ip_local_deliver+0x62a/0x7c0 [ 1461.904688][ C0] ip_rcv+0x6cf/0x750 [ 1461.908667][ C0] process_backlog+0xfb5/0x14e0 [ 1461.913513][ C0] net_rx_action+0x746/0x1aa0 [ 1461.918194][ C0] __do_softirq+0x311/0x83d [ 1461.922690][ C0] [ 1461.925011][ C0] Uninit was created at: [ 1461.929301][ C0] kmsan_save_stack_with_flags+0x3c/0x90 [ 1461.934936][ C0] kmsan_alloc_page+0xb9/0x180 [ 1461.939708][ C0] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1461.945288][ C0] alloc_pages_current+0x672/0x990 [ 1461.950424][ C0] alloc_slab_page+0x122/0x1300 [ 1461.955271][ C0] new_slab+0x2bc/0x1130 [ 1461.959518][ C0] ___slab_alloc+0x14a3/0x2040 [ 1461.964285][ C0] kmem_cache_alloc+0xb23/0xd70 [ 1461.969133][ C0] inet_reqsk_alloc+0xac/0x830 [ 1461.973899][ C0] tcp_conn_request+0x753/0x4d10 [ 1461.978848][ C0] tcp_v4_conn_request+0x19b/0x240 [ 1461.983964][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 1461.989337][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 1461.993933][ C0] tcp_v4_rcv+0x425c/0x5040 [ 1461.998440][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1462.003902][ C0] ip_local_deliver+0x62a/0x7c0 [ 1462.008751][ C0] ip_sublist_rcv+0x125d/0x1450 [ 1462.013598][ C0] ip_list_rcv+0x904/0x970 [ 1462.018014][ C0] __netif_receive_skb_list_core+0x1459/0x14d0 [ 1462.024193][ C0] netif_receive_skb_list_internal+0xf66/0x1610 [ 1462.030439][ C0] napi_complete_done+0x439/0xe10 [ 1462.035461][ C0] virtqueue_napi_complete+0xb9/0x1f0 [ 1462.040832][ C0] virtnet_poll+0x1468/0x19f0 [ 1462.045513][ C0] net_rx_action+0x746/0x1aa0 [ 1462.050191][ C0] __do_softirq+0x311/0x83d 05:58:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="6653960d0ec5d684fa9f01070000053c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f76460234432479aed75d492b415bcee00a", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 05:58:41 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit_group(0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 05:58:41 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x1, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 05:58:41 executing program 2: r0 = socket(0x10, 0x2, 0x0) setreuid(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, 0x0, 0x48000) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='hsr0\x00', 0x10) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000280)) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)) 05:58:41 executing program 3: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:41 executing program 1: sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x0, 0x0, 0x25dfdbfe}, 0x1c}}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=0x1f, 0x4) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) [ 1462.452072][T29069] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000340)=""/128) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000000c0)}}], 0x2, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000000c0)=0x3) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x0, 0x1f}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r3, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r3, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) 05:58:41 executing program 4: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x4d) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) [ 1462.528482][T29069] device team_slave_0 entered promiscuous mode [ 1462.534909][T29069] device team_slave_1 entered promiscuous mode [ 1462.544294][T29069] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:58:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x14c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xd, 0x3, "7afb80252ec6d07c0c"}]}, @TIPC_NLA_NODE={0x6c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x46d8}, @TIPC_NLA_NODE_KEY={0x3e, 0x4, {'gcm(aes)\x00', 0x16, "f45a92c18360ff72c7ac3060788150be6fe84159a635"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8001}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x64010100}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_LINK={0x38, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc8e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x2000810}, 0x4bde50919caa9fe6) creat(&(0x7f0000000000)='./file0\x00', 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./file1\x00', 0x8, 0x1) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x2008480, &(0x7f000000a000)) [ 1462.637635][T29069] device team_slave_0 left promiscuous mode [ 1462.643770][T29069] device team_slave_1 left promiscuous mode 05:58:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x12, 0x0, &(0x7f0000000040)) 05:58:42 executing program 3: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:42 executing program 1: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x14, &(0x7f00000000c0), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x6, 0x0, 0x80002000, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x200, @local, 0x5}, 0x1c) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x4d) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) [ 1463.752754][T29108] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1463.864678][T29108] device team_slave_0 entered promiscuous mode [ 1463.871078][T29108] device team_slave_1 entered promiscuous mode [ 1463.880896][T29108] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1463.979295][T29108] device team_slave_0 left promiscuous mode [ 1463.985403][T29108] device team_slave_1 left promiscuous mode 05:58:45 executing program 3: r0 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:45 executing program 0: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="ad56b6c5820fae9d6dcd3292ea54020000005d564c90c200", 0x18) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$sock(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000280)="b4", 0x1}], 0x1}, 0x0) dup3(r2, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:58:45 executing program 5: 05:58:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000340)=""/128) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000000c0)}}], 0x2, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000000c0)) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x7, 0x1f}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x80, 0x40, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r4, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r4, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) 05:58:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x114, 0x0, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xb, 0x3, "7afb80252ec6d0"}]}, @TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x46d8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x136}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8001}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x64010100}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_LINK={0x38, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc8e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x114}}, 0x4bde50919caa9fe6) creat(&(0x7f0000000000)='./file0\x00', 0x4) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./file1\x00', 0x8, 0x1) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x2008480, &(0x7f000000a000)) 05:58:45 executing program 1: [ 1466.475459][T29137] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:45 executing program 5: 05:58:45 executing program 1: [ 1466.643145][T29137] device team_slave_0 entered promiscuous mode [ 1466.649468][T29137] device team_slave_1 entered promiscuous mode [ 1466.658975][T29137] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:58:46 executing program 4: 05:58:46 executing program 2: [ 1466.879559][T29137] device team_slave_0 left promiscuous mode [ 1466.885796][T29137] device team_slave_1 left promiscuous mode 05:58:46 executing program 5: 05:58:46 executing program 1: 05:58:47 executing program 3: r0 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:47 executing program 4: 05:58:47 executing program 0: 05:58:47 executing program 2: 05:58:47 executing program 5: 05:58:47 executing program 1: 05:58:47 executing program 5: 05:58:47 executing program 0: 05:58:47 executing program 1: [ 1468.216425][T29180] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:47 executing program 2: [ 1468.273621][T29180] device team_slave_0 entered promiscuous mode [ 1468.279947][T29180] device team_slave_1 entered promiscuous mode [ 1468.289189][T29180] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:58:47 executing program 4: [ 1468.508011][T29180] device team_slave_0 left promiscuous mode [ 1468.514190][T29180] device team_slave_1 left promiscuous mode 05:58:47 executing program 1: 05:58:48 executing program 3: r0 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:48 executing program 5: 05:58:48 executing program 2: 05:58:48 executing program 4: 05:58:48 executing program 0: 05:58:48 executing program 1: 05:58:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000140)={0xc016}) 05:58:48 executing program 0: unshare(0x44000600) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_ABS_SETUP(r0, 0x40045565, 0x0) 05:58:48 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={r3, @broadcast, @multicast1}, 0xc) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 05:58:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x38, 0x0, 0x0) [ 1469.548505][T29204] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000000000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) [ 1469.654556][T29204] device team_slave_0 entered promiscuous mode [ 1469.660944][T29204] device team_slave_1 entered promiscuous mode [ 1469.670041][T29204] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1469.772859][T29214] IPVS: ftp: loaded support on port[0] = 21 [ 1469.820133][T29217] input: syz1 as /devices/virtual/input/input6 [ 1469.918868][T29204] device team_slave_0 left promiscuous mode [ 1469.925082][T29204] device team_slave_1 left promiscuous mode 05:58:49 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1470.573874][T29217] IPVS: ftp: loaded support on port[0] = 21 [ 1470.656767][T29223] input: syz1 as /devices/virtual/input/input7 05:58:50 executing program 3: r0 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$tipc(0x1e, 0x4, 0x0) r2 = dup2(r0, r1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @multicast1}}}}) 05:58:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$tipc(0x1e, 0x4, 0x0) r2 = dup2(r0, r1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000100)={'erspan0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}}}}) 05:58:50 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$tipc(0x1e, 0x4, 0x0) r4 = dup2(r2, r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r5, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r5, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r7}}}], 0x28}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r7, 0x29, 0x81, 0x1, 0x7, 0x64, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', 0xf870, 0x0, 0x9, 0x3}}) r8 = socket$tipc(0x1e, 0x4, 0x0) dup2(r1, r8) recvmmsg(r8, &(0x7f00000037c0), 0x0, 0x160, 0x0) [ 1471.302682][T29297] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:50 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0}, 0x20) 05:58:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000043faa287000100000a"], 0xb8}}, 0x0) [ 1471.414111][T24173] tipc: TX() has been purged, node left! [ 1471.501683][T29297] device team_slave_0 entered promiscuous mode [ 1471.508005][T29297] device team_slave_1 entered promiscuous mode [ 1471.517427][T29297] 8021q: adding VLAN 0 to HW filter on device macvtap1 05:58:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x3, 0x0, 0x0) 05:58:50 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x40, &(0x7f00000002c0)={0x100000000, 0x7, 0x9, 0x6, 0x1, 0x8, 0x1, 0x3ed}, &(0x7f0000000380)={0x8, 0x6, 0x7839, 0xfffffffffffffff8, 0x3, 0x0, 0xffffffffffffffff, 0x3f}, &(0x7f00000003c0)={0x2000000000000, 0x800080, 0xffffffff, 0x20, 0xfd1, 0xe691, 0x1ff}, &(0x7f0000000440)={0x0, r3/1000+60000}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) poll(0x0, 0x0, 0x8000000000000200) socket(0xe, 0x5, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x4031, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) [ 1471.693513][T29297] device team_slave_0 left promiscuous mode [ 1471.699720][T29297] device team_slave_1 left promiscuous mode 05:58:51 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0505405, &(0x7f0000000040)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) 05:58:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\b\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5401, &(0x7f0000000240)) 05:58:52 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x40, &(0x7f00000002c0)={0x100000000, 0x7, 0x9, 0x6, 0x1, 0x8, 0x1, 0x3ed}, &(0x7f0000000380)={0x8, 0x6, 0x7839, 0xfffffffffffffff8, 0x3, 0x0, 0xffffffffffffffff, 0x3f}, &(0x7f00000003c0)={0x2000000000000, 0x800080, 0xffffffff, 0x20, 0xfd1, 0xe691, 0x1ff}, &(0x7f0000000440)={0x0, r3/1000+60000}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) poll(0x0, 0x0, 0x8000000000000200) socket(0xe, 0x5, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x4031, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:58:52 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) getpid() pipe(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @broadcast}, @in=@loopback, 0x0, 0x0, 0x4e23, 0x0, 0x2, 0x60, 0x80}, {0x7f, 0x2, 0x6, 0x8, 0xfffffffffffffff7, 0xe4, 0x0, 0x2}, {}, 0x1ff, 0x0, 0x1, 0x0, 0x2, 0x1}, {{@in6=@local, 0x4d4}, 0xa, @in6=@empty, 0x0, 0x3, 0x3, 0xb, 0x10001, 0x7c}}, 0xe8) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040)={0x0, 0xea60}, 0x10) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) fcntl$setpipe(r1, 0x407, 0x0) 05:58:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$tipc(0x1e, 0x4, 0x0) r4 = dup2(r2, r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r5, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r5, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r7}}}], 0x28}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r7, 0x29, 0x81, 0x1, 0x7, 0x64, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', 0xf870, 0x0, 0x9, 0x3}}) r8 = socket$tipc(0x1e, 0x4, 0x0) dup2(r1, r8) recvmmsg(r8, &(0x7f00000037c0), 0x0, 0x160, 0x0) 05:58:52 executing program 5: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) socket$packet(0x11, 0x0, 0x300) 05:58:52 executing program 3: r0 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:52 executing program 0: unshare(0x64040600) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:58:53 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) [ 1473.912965][T29358] IPVS: ftp: loaded support on port[0] = 21 05:58:53 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x40, &(0x7f00000002c0)={0x100000000, 0x7, 0x9, 0x6, 0x1, 0x8, 0x1, 0x3ed}, &(0x7f0000000380)={0x8, 0x6, 0x7839, 0xfffffffffffffff8, 0x3, 0x0, 0xffffffffffffffff, 0x3f}, &(0x7f00000003c0)={0x2000000000000, 0x800080, 0xffffffff, 0x20, 0xfd1, 0xe691, 0x1ff}, &(0x7f0000000440)={0x0, r3/1000+60000}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) poll(0x0, 0x0, 0x8000000000000200) socket(0xe, 0x5, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x4031, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) [ 1474.051367][T29360] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1474.175720][T29360] device team_slave_0 entered promiscuous mode [ 1474.182151][T29360] device team_slave_1 entered promiscuous mode [ 1474.191601][T29360] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1474.326417][T29360] device team_slave_0 left promiscuous mode [ 1474.332616][T29360] device team_slave_1 left promiscuous mode 05:58:53 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$tipc(0x1e, 0x4, 0x0) r4 = dup2(r2, r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r5, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r5, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r7}}}], 0x28}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r7, 0x29, 0x81, 0x1, 0x7, 0x64, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', 0xf870, 0x0, 0x9, 0x3}}) r8 = socket$tipc(0x1e, 0x4, 0x0) dup2(r1, r8) recvmmsg(r8, &(0x7f00000037c0), 0x0, 0x160, 0x0) [ 1474.682379][T29361] IPVS: ftp: loaded support on port[0] = 21 05:58:54 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x7a0a5500, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @random="94018817da6f"}, 0x10) statx(r2, &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, &(0x7f0000000340)) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) ptrace$setopts(0x4206, r3, 0x8000, 0x1) 05:58:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='Ku'], 0x5) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 05:58:54 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x40, &(0x7f00000002c0)={0x100000000, 0x7, 0x9, 0x6, 0x1, 0x8, 0x1, 0x3ed}, &(0x7f0000000380)={0x8, 0x6, 0x7839, 0xfffffffffffffff8, 0x3, 0x0, 0xffffffffffffffff, 0x3f}, &(0x7f00000003c0)={0x2000000000000, 0x800080, 0xffffffff, 0x20, 0xfd1, 0xe691, 0x1ff}, &(0x7f0000000440)={0x0, r3/1000+60000}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) poll(0x0, 0x0, 0x8000000000000200) socket(0xe, 0x5, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x4031, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:58:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 05:58:55 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$tipc(0x1e, 0x4, 0x0) r4 = dup2(r2, r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r5, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r5, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r7}}}], 0x28}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r7, 0x29, 0x81, 0x1, 0x7, 0x64, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', 0xf870, 0x0, 0x9, 0x3}}) r8 = socket$tipc(0x1e, 0x4, 0x0) dup2(r1, r8) recvmmsg(r8, &(0x7f00000037c0), 0x0, 0x160, 0x0) 05:58:55 executing program 3: r0 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:58:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 05:58:55 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d0600000000000020000100000a"], 0xb8}}, 0x0) [ 1476.338676][T29415] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1476.463836][T29415] device team_slave_0 entered promiscuous mode [ 1476.470214][T29415] device team_slave_1 entered promiscuous mode [ 1476.479411][T29415] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1476.752709][T29415] device team_slave_0 left promiscuous mode [ 1476.758800][T29415] device team_slave_1 left promiscuous mode [ 1478.240914][ C1] not chained 570000 origins [ 1478.245562][ C1] CPU: 1 PID: 24103 Comm: kworker/u4:13 Not tainted 5.8.0-rc5-syzkaller #0 [ 1478.254146][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1478.264224][ C1] Workqueue: krdsd rds_tcp_accept_worker [ 1478.269856][ C1] Call Trace: [ 1478.273143][ C1] [ 1478.276005][ C1] dump_stack+0x1df/0x240 [ 1478.280340][ C1] ? tcp_v4_do_rcv+0xb0f/0xd70 [ 1478.285123][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 1478.290847][ C1] ? local_bh_enable+0x36/0x40 [ 1478.295612][ C1] ? ip_finish_output2+0x1fee/0x24a0 [ 1478.300901][ C1] ? __ip_finish_output+0xaa7/0xd80 [ 1478.306100][ C1] ? ip_finish_output+0x166/0x410 [ 1478.311133][ C1] ? ip_output+0x593/0x680 [ 1478.315548][ C1] ? __ip_queue_xmit+0x1b5c/0x21a0 [ 1478.320662][ C1] ? ip_queue_xmit+0xcc/0xf0 [ 1478.325259][ C1] ? __tcp_transmit_skb+0x440e/0x6090 [ 1478.330634][ C1] ? tcp_write_xmit+0x30b1/0xb430 [ 1478.335665][ C1] ? __tcp_push_pending_frames+0x124/0x4e0 [ 1478.341462][ C1] ? tcp_send_fin+0x131e/0x1570 [ 1478.346344][ C1] ? tcp_shutdown+0x188/0x200 [ 1478.351019][ C1] ? inet_shutdown+0x342/0x5e0 [ 1478.355780][ C1] ? kernel_sock_shutdown+0x9d/0xc0 [ 1478.360992][ C1] ? rds_tcp_accept_one+0xe18/0x1060 [ 1478.366284][ C1] ? rds_tcp_accept_worker+0x61/0x160 [ 1478.371656][ C1] ? process_one_work+0x1540/0x1f30 [ 1478.376850][ C1] ? worker_thread+0xed2/0x23f0 [ 1478.381695][ C1] ? kthread+0x515/0x550 [ 1478.385963][ C1] ? ret_from_fork+0x22/0x30 [ 1478.390558][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1478.395752][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1478.401558][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1478.407621][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1478.412814][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1478.418600][ C1] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1478.424753][ C1] ? __msan_get_context_state+0x9/0x20 [ 1478.430191][ C1] ? __module_get+0x19/0x230 [ 1478.434788][ C1] ? inet_twsk_alloc+0x7bb/0xba0 [ 1478.439709][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1478.444887][ C1] __msan_chain_origin+0x50/0x90 [ 1478.449811][ C1] tcp_time_wait+0xb7e/0x10b0 [ 1478.454524][ C1] tcp_fin+0x1f9/0x890 [ 1478.458591][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1478.463439][ C1] ? tcp_urg+0x8e1/0xde0 [ 1478.467714][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1478.473164][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1478.478965][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1478.484171][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1478.488817][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1478.493330][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 1478.499464][ C1] ? tcp_v4_rcv+0x1531/0x5040 [ 1478.504135][ C1] ? tcp_filter+0xf0/0xf0 [ 1478.508450][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1478.513952][ C1] ip_local_deliver+0x62a/0x7c0 [ 1478.518806][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 1478.523818][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 1478.529487][ C1] ip_rcv+0x6cf/0x750 [ 1478.533470][ C1] ? ip_rcv_core+0x12c0/0x12c0 [ 1478.538223][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 1478.543852][ C1] process_backlog+0xfb5/0x14e0 [ 1478.548719][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 1478.553994][ C1] net_rx_action+0x746/0x1aa0 [ 1478.558671][ C1] ? net_tx_action+0xc40/0xc40 [ 1478.563424][ C1] __do_softirq+0x311/0x83d [ 1478.567930][ C1] asm_call_on_stack+0x12/0x20 [ 1478.572676][ C1] [ 1478.575604][ C1] do_softirq_own_stack+0x7c/0xa0 [ 1478.580630][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 1478.585833][ C1] local_bh_enable+0x36/0x40 [ 1478.590413][ C1] ip_finish_output2+0x1fee/0x24a0 [ 1478.595524][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 1478.601538][ C1] __ip_finish_output+0xaa7/0xd80 [ 1478.606591][ C1] ip_finish_output+0x166/0x410 [ 1478.611446][ C1] ip_output+0x593/0x680 [ 1478.615694][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 1478.620990][ C1] ? ip_finish_output+0x410/0x410 [ 1478.626016][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 1478.630942][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 1478.636468][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1478.641676][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1478.646889][ C1] ip_queue_xmit+0xcc/0xf0 [ 1478.651294][ C1] ? tcp_v6_send_response+0x2920/0x2920 [ 1478.656841][ C1] __tcp_transmit_skb+0x440e/0x6090 [ 1478.662078][ C1] tcp_write_xmit+0x30b1/0xb430 [ 1478.666984][ C1] __tcp_push_pending_frames+0x124/0x4e0 [ 1478.672624][ C1] tcp_send_fin+0x131e/0x1570 [ 1478.677294][ C1] tcp_shutdown+0x188/0x200 [ 1478.681795][ C1] ? tcp_set_state+0x9d0/0x9d0 [ 1478.686554][ C1] inet_shutdown+0x342/0x5e0 [ 1478.691135][ C1] ? inet_recvmsg+0x7d0/0x7d0 [ 1478.695806][ C1] kernel_sock_shutdown+0x9d/0xc0 [ 1478.700843][ C1] rds_tcp_accept_one+0xe18/0x1060 [ 1478.705962][ C1] rds_tcp_accept_worker+0x61/0x160 [ 1478.711159][ C1] ? rds_tcp_exit_net+0xcc0/0xcc0 [ 1478.716208][ C1] process_one_work+0x1540/0x1f30 [ 1478.721263][ C1] worker_thread+0xed2/0x23f0 [ 1478.725942][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1478.731747][ C1] kthread+0x515/0x550 [ 1478.735797][ C1] ? process_one_work+0x1f30/0x1f30 [ 1478.740992][ C1] ? kthread_blkcg+0xf0/0xf0 [ 1478.745577][ C1] ret_from_fork+0x22/0x30 [ 1478.749980][ C1] Uninit was stored to memory at: [ 1478.754985][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1478.760689][ C1] __msan_chain_origin+0x50/0x90 [ 1478.765630][ C1] inet_twsk_alloc+0xab6/0xba0 [ 1478.770382][ C1] tcp_time_wait+0xcd/0x10b0 [ 1478.774954][ C1] tcp_fin+0x1f9/0x890 [ 1478.779001][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1478.783830][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1478.789262][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1478.793828][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1478.798308][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1478.803740][ C1] ip_local_deliver+0x62a/0x7c0 [ 1478.808568][ C1] ip_rcv+0x6cf/0x750 [ 1478.812538][ C1] process_backlog+0xfb5/0x14e0 [ 1478.817379][ C1] net_rx_action+0x746/0x1aa0 [ 1478.822048][ C1] __do_softirq+0x311/0x83d [ 1478.826559][ C1] [ 1478.828876][ C1] Uninit was stored to memory at: [ 1478.833885][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1478.839592][ C1] __msan_chain_origin+0x50/0x90 [ 1478.844529][ C1] __inet_twsk_schedule+0x24e/0x2c0 [ 1478.849703][ C1] tcp_time_wait+0xaca/0x10b0 [ 1478.854357][ C1] tcp_fin+0x1f9/0x890 [ 1478.858400][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1478.863243][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1478.868694][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1478.873264][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1478.877743][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1478.883211][ C1] ip_local_deliver+0x62a/0x7c0 [ 1478.888060][ C1] ip_rcv+0x6cf/0x750 [ 1478.892023][ C1] process_backlog+0xfb5/0x14e0 [ 1478.896850][ C1] net_rx_action+0x746/0x1aa0 [ 1478.901516][ C1] __do_softirq+0x311/0x83d [ 1478.906001][ C1] [ 1478.908303][ C1] Uninit was stored to memory at: [ 1478.913325][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1478.919035][ C1] __msan_chain_origin+0x50/0x90 [ 1478.923963][ C1] tcp_time_wait+0xb7e/0x10b0 [ 1478.928642][ C1] tcp_fin+0x1f9/0x890 [ 1478.932699][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1478.937543][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1478.942990][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1478.947572][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1478.952055][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1478.957499][ C1] ip_local_deliver+0x62a/0x7c0 [ 1478.962336][ C1] ip_rcv+0x6cf/0x750 [ 1478.966309][ C1] process_backlog+0xfb5/0x14e0 [ 1478.971148][ C1] net_rx_action+0x746/0x1aa0 [ 1478.975800][ C1] __do_softirq+0x311/0x83d [ 1478.980270][ C1] [ 1478.982580][ C1] Uninit was stored to memory at: [ 1478.987608][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1478.993316][ C1] __msan_chain_origin+0x50/0x90 [ 1478.998230][ C1] inet_twsk_alloc+0xab6/0xba0 [ 1479.002976][ C1] tcp_time_wait+0xcd/0x10b0 [ 1479.007541][ C1] tcp_fin+0x1f9/0x890 [ 1479.011584][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1479.016411][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1479.021856][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1479.026434][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1479.030929][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1479.036376][ C1] ip_local_deliver+0x62a/0x7c0 [ 1479.041221][ C1] ip_rcv+0x6cf/0x750 [ 1479.045206][ C1] process_backlog+0xfb5/0x14e0 [ 1479.050049][ C1] net_rx_action+0x746/0x1aa0 [ 1479.054703][ C1] __do_softirq+0x311/0x83d [ 1479.059177][ C1] [ 1479.061490][ C1] Uninit was stored to memory at: [ 1479.066511][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1479.072212][ C1] __msan_chain_origin+0x50/0x90 [ 1479.077151][ C1] __inet_twsk_schedule+0x24e/0x2c0 [ 1479.082338][ C1] tcp_time_wait+0xaca/0x10b0 [ 1479.087005][ C1] tcp_fin+0x1f9/0x890 [ 1479.091068][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1479.095895][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1479.101355][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1479.105954][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1479.110443][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1479.115902][ C1] ip_local_deliver+0x62a/0x7c0 [ 1479.120740][ C1] ip_rcv+0x6cf/0x750 [ 1479.124729][ C1] process_backlog+0xfb5/0x14e0 [ 1479.129555][ C1] net_rx_action+0x746/0x1aa0 [ 1479.134211][ C1] __do_softirq+0x311/0x83d [ 1479.138693][ C1] [ 1479.141003][ C1] Uninit was stored to memory at: [ 1479.146023][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1479.151732][ C1] __msan_chain_origin+0x50/0x90 [ 1479.156680][ C1] tcp_time_wait+0xb7e/0x10b0 [ 1479.161367][ C1] tcp_fin+0x1f9/0x890 [ 1479.165425][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1479.170260][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1479.175698][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1479.180264][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1479.184760][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1479.190209][ C1] ip_local_deliver+0x62a/0x7c0 [ 1479.195035][ C1] ip_rcv+0x6cf/0x750 [ 1479.198995][ C1] process_backlog+0xfb5/0x14e0 [ 1479.203823][ C1] net_rx_action+0x746/0x1aa0 [ 1479.208475][ C1] __do_softirq+0x311/0x83d [ 1479.212948][ C1] [ 1479.215249][ C1] Uninit was stored to memory at: [ 1479.220253][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1479.225965][ C1] __msan_chain_origin+0x50/0x90 [ 1479.230883][ C1] inet_twsk_alloc+0xab6/0xba0 [ 1479.235624][ C1] tcp_time_wait+0xcd/0x10b0 [ 1479.240204][ C1] tcp_fin+0x1f9/0x890 [ 1479.244250][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1479.249089][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1479.254541][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1479.259118][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1479.263609][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1479.269059][ C1] ip_local_deliver+0x62a/0x7c0 [ 1479.273889][ C1] ip_rcv+0x6cf/0x750 [ 1479.277847][ C1] process_backlog+0xfb5/0x14e0 [ 1479.282684][ C1] net_rx_action+0x746/0x1aa0 [ 1479.287351][ C1] __do_softirq+0x311/0x83d [ 1479.291826][ C1] [ 1479.294127][ C1] Uninit was created at: [ 1479.298347][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 1479.303958][ C1] kmsan_alloc_page+0xb9/0x180 [ 1479.308715][ C1] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1479.314239][ C1] alloc_pages_current+0x672/0x990 [ 1479.319324][ C1] alloc_slab_page+0x122/0x1300 [ 1479.324150][ C1] new_slab+0x2bc/0x1130 [ 1479.328369][ C1] ___slab_alloc+0x14a3/0x2040 [ 1479.333118][ C1] kmem_cache_alloc+0xb23/0xd70 [ 1479.337958][ C1] inet_twsk_alloc+0x135/0xba0 [ 1479.342709][ C1] tcp_time_wait+0xcd/0x10b0 [ 1479.347292][ C1] tcp_fin+0x1f9/0x890 [ 1479.351342][ C1] tcp_data_queue+0x12a3/0x9fd0 [ 1479.356193][ C1] tcp_rcv_state_process+0x5ba3/0x71c0 [ 1479.361666][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1479.366249][ C1] tcp_v4_rcv+0x4c77/0x5040 [ 1479.370742][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1479.376197][ C1] ip_local_deliver+0x62a/0x7c0 [ 1479.381038][ C1] ip_rcv+0x6cf/0x750 [ 1479.385011][ C1] process_backlog+0xfb5/0x14e0 [ 1479.389836][ C1] net_rx_action+0x746/0x1aa0 [ 1479.394504][ C1] __do_softirq+0x311/0x83d 05:58:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet6(r0, 0x0, 0xffffffffffffff0d, 0x40000020, 0x0, 0x0) 05:58:59 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x40, &(0x7f00000002c0)={0x100000000, 0x7, 0x9, 0x6, 0x1, 0x8, 0x1, 0x3ed}, &(0x7f0000000380)={0x8, 0x6, 0x7839, 0xfffffffffffffff8, 0x3, 0x0, 0xffffffffffffffff, 0x3f}, &(0x7f00000003c0)={0x2000000000000, 0x800080, 0xffffffff, 0x20, 0xfd1, 0xe691, 0x1ff}, &(0x7f0000000440)={0x0, r3/1000+60000}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) poll(0x0, 0x0, 0x8000000000000200) socket(0xe, 0x5, 0x0) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:58:59 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:58:59 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$tipc(0x1e, 0x4, 0x0) r4 = dup2(r2, r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r5, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r5, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r7}}}], 0x28}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r7, 0x29, 0x81, 0x1, 0x7, 0x64, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', 0xf870, 0x0, 0x9, 0x3}}) r8 = socket$tipc(0x1e, 0x4, 0x0) dup2(r1, r8) 05:58:59 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x80e85411) 05:58:59 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1479.762310][T24173] tipc: TX() has been purged, node left! [ 1479.958262][T29447] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1480.116239][T29447] device dummy0 entered promiscuous mode 05:58:59 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x4ac41) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r1, r0) [ 1480.259765][T29447] device dummy0 left promiscuous mode 05:58:59 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:00 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x40, &(0x7f00000002c0)={0x100000000, 0x7, 0x9, 0x6, 0x1, 0x8, 0x1, 0x3ed}, &(0x7f0000000380)={0x8, 0x6, 0x7839, 0xfffffffffffffff8, 0x3, 0x0, 0xffffffffffffffff, 0x3f}, &(0x7f00000003c0)={0x2000000000000, 0x800080, 0xffffffff, 0x20, 0xfd1, 0xe691, 0x1ff}, &(0x7f0000000440)={0x0, r3/1000+60000}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) poll(0x0, 0x0, 0x8000000000000200) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:00 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000000)=""/22, 0x16}], 0x6, 0x0, 0x0, 0x94100000}}], 0x1, 0x0, 0x0) 05:59:00 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:02 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 05:59:02 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x40, &(0x7f00000002c0)={0x100000000, 0x7, 0x9, 0x6, 0x1, 0x8, 0x1, 0x3ed}, &(0x7f0000000380)={0x8, 0x6, 0x7839, 0xfffffffffffffff8, 0x3, 0x0, 0xffffffffffffffff, 0x3f}, &(0x7f00000003c0)={0x2000000000000, 0x800080, 0xffffffff, 0x20, 0xfd1, 0xe691, 0x1ff}, &(0x7f0000000440)={0x0, r3/1000+60000}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:02 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r6}}}], 0x28}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r6, 0x29, 0x81, 0x1, 0x7, 0x64, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', 0xf870, 0x0, 0x9, 0x3}}) socket$tipc(0x1e, 0x4, 0x0) 05:59:02 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4c81, &(0x7f0000000040)) 05:59:02 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1483.253508][T29505] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:02 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) [ 1483.354717][T29505] device dummy0 entered promiscuous mode [ 1483.409247][T29505] device dummy0 left promiscuous mode 05:59:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4c81, &(0x7f0000000040)) 05:59:02 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x0, 0xea60}, 0x10) sendto(r0, &(0x7f0000000000)="b8", 0xffffffffffffff47, 0x20000010, 0x0, 0xc) r1 = gettid() tkill(r1, 0x3c) 05:59:03 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040)={0x0, 0xea60}, 0x10) read(r0, &(0x7f0000000300)=""/234, 0xea) 05:59:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4c81, &(0x7f0000000040)) 05:59:03 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x40, &(0x7f00000002c0)={0x100000000, 0x7, 0x9, 0x6, 0x1, 0x8, 0x1, 0x3ed}, &(0x7f0000000380)={0x8, 0x6, 0x7839, 0xfffffffffffffff8, 0x3, 0x0, 0xffffffffffffffff, 0x3f}, &(0x7f00000003c0)={0x2000000000000, 0x800080, 0xffffffff, 0x20, 0xfd1, 0xe691, 0x1ff}, &(0x7f0000000440)={0x0, r3/1000+60000}) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:03 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r6}}}], 0x28}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r6, 0x29, 0x81, 0x1, 0x7, 0x64, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', 0xf870, 0x0, 0x9, 0x3}}) 05:59:03 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4c81, &(0x7f0000000040)) 05:59:03 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r6}}}], 0x28}}], 0x2, 0x0) 05:59:04 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:04 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) [ 1485.017300][T29561] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:04 executing program 5: ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x4c81, &(0x7f0000000040)) 05:59:04 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:04 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}}}}], 0x28}}], 0x2, 0x0) [ 1485.164559][T29561] device dummy0 entered promiscuous mode 05:59:04 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3e, 0x0, 0x0) [ 1485.225273][T29561] device dummy0 left promiscuous mode 05:59:04 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:04 executing program 5: ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x4c81, &(0x7f0000000040)) 05:59:05 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) 05:59:05 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:05 executing program 5: ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x4c81, &(0x7f0000000040)) 05:59:05 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, 0x0, 0x0) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:05 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:05 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}}}}], 0x28}}], 0x2, 0x0) 05:59:05 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:05 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={r3, @broadcast, @multicast1}, 0xc) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 05:59:05 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4c81, &(0x7f0000000040)) [ 1486.666528][T29599] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:06 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}}}}], 0x28}}], 0x2, 0x0) [ 1486.825160][T29599] device dummy0 entered promiscuous mode [ 1486.948059][T29599] device dummy0 left promiscuous mode 05:59:06 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:06 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x80605414) 05:59:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4c81, &(0x7f0000000040)) 05:59:06 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:06 executing program 0: close(0xffffffffffffffff) r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000200)='X', 0x1, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) socket$packet(0x11, 0x0, 0x300) 05:59:06 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:07 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:07 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4c81, &(0x7f0000000040)) 05:59:07 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:07 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:07 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r5 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r6}}}], 0x28}}], 0x2, 0x0) [ 1488.401946][T29630] not chained 580000 origins [ 1488.406613][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1488.415288][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.425351][T29630] Call Trace: [ 1488.428678][T29630] dump_stack+0x1df/0x240 [ 1488.433042][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1488.438816][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1488.443956][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1488.449876][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1488.455191][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1488.460408][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1488.466263][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1488.472342][T29630] ? kfree+0x61/0x30f0 [ 1488.476435][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1488.481575][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1488.487153][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1488.493249][T29630] ? _copy_from_user+0x15b/0x260 [ 1488.498212][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1488.503343][T29630] __msan_chain_origin+0x50/0x90 [ 1488.508304][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1488.512970][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1488.518277][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1488.523318][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1488.528357][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1488.534308][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1488.539277][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1488.544149][T29630] do_syscall_64+0xb0/0x150 [ 1488.548675][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1488.554576][T29630] RIP: 0033:0x45c1d9 [ 1488.558469][T29630] Code: Bad RIP value. [ 1488.562539][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1488.570974][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1488.578968][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1488.586956][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1488.594940][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1488.602926][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1488.610925][T29630] Uninit was stored to memory at: [ 1488.615996][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1488.621762][T29630] __msan_chain_origin+0x50/0x90 [ 1488.626734][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1488.631358][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1488.636317][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1488.641194][T29630] do_syscall_64+0xb0/0x150 [ 1488.645717][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1488.651615][T29630] [ 1488.653954][T29630] Uninit was stored to memory at: [ 1488.659010][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1488.664796][T29630] __msan_chain_origin+0x50/0x90 [ 1488.669804][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1488.674424][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1488.679393][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1488.684276][T29630] do_syscall_64+0xb0/0x150 [ 1488.688811][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1488.694715][T29630] [ 1488.697056][T29630] Uninit was stored to memory at: [ 1488.702109][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1488.707854][T29630] __msan_chain_origin+0x50/0x90 [ 1488.712819][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1488.717429][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1488.722383][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1488.727252][T29630] do_syscall_64+0xb0/0x150 [ 1488.731788][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1488.737710][T29630] [ 1488.740046][T29630] Uninit was stored to memory at: [ 1488.745097][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1488.750864][T29630] __msan_chain_origin+0x50/0x90 [ 1488.755846][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1488.760456][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1488.765416][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1488.770284][T29630] do_syscall_64+0xb0/0x150 [ 1488.774818][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1488.780712][T29630] [ 1488.783049][T29630] Uninit was stored to memory at: [ 1488.788105][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1488.793841][T29630] __msan_chain_origin+0x50/0x90 [ 1488.798802][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1488.803403][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1488.808359][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1488.813223][T29630] do_syscall_64+0xb0/0x150 [ 1488.817746][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1488.823647][T29630] [ 1488.825978][T29630] Uninit was stored to memory at: [ 1488.831023][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1488.836760][T29630] __msan_chain_origin+0x50/0x90 [ 1488.841719][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1488.846322][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1488.851277][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1488.856146][T29630] do_syscall_64+0xb0/0x150 [ 1488.860664][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1488.866581][T29630] [ 1488.868914][T29630] Uninit was stored to memory at: [ 1488.873997][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1488.879736][T29630] __msan_chain_origin+0x50/0x90 [ 1488.884702][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1488.889318][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1488.894297][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1488.899172][T29630] do_syscall_64+0xb0/0x150 05:59:08 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:08 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) [ 1488.903695][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1488.909594][T29630] [ 1488.911937][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1488.918635][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1488.923069][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1489.016968][T29649] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:08 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x4c81, &(0x7f0000000040)) [ 1489.183470][T29649] device dummy0 entered promiscuous mode 05:59:08 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r5 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r6}}}], 0x28}}], 0x2, 0x0) [ 1489.295188][T29649] device dummy0 left promiscuous mode 05:59:08 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) [ 1490.430454][T29630] not chained 590000 origins [ 1490.435121][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1490.443813][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1490.453886][T29630] Call Trace: [ 1490.457209][T29630] dump_stack+0x1df/0x240 [ 1490.461584][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1490.467334][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1490.472476][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1490.478401][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1490.483719][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1490.488948][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1490.494783][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1490.500881][T29630] ? kfree+0x61/0x30f0 [ 1490.504985][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1490.510123][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1490.515706][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1490.521812][T29630] ? _copy_from_user+0x15b/0x260 [ 1490.526774][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1490.531906][T29630] __msan_chain_origin+0x50/0x90 [ 1490.536865][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1490.541581][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1490.546912][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1490.551950][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1490.556992][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1490.562910][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1490.567881][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1490.572755][T29630] do_syscall_64+0xb0/0x150 [ 1490.577278][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1490.583181][T29630] RIP: 0033:0x45c1d9 [ 1490.587076][T29630] Code: Bad RIP value. [ 1490.591156][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1490.599582][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1490.607568][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1490.615575][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1490.623650][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1490.631644][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1490.639684][T29630] Uninit was stored to memory at: [ 1490.644735][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1490.650471][T29630] __msan_chain_origin+0x50/0x90 [ 1490.655427][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1490.660040][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1490.665010][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1490.669879][T29630] do_syscall_64+0xb0/0x150 [ 1490.674411][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1490.680301][T29630] [ 1490.682633][T29630] Uninit was stored to memory at: [ 1490.687686][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1490.693418][T29630] __msan_chain_origin+0x50/0x90 [ 1490.698367][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1490.702966][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1490.707921][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1490.712784][T29630] do_syscall_64+0xb0/0x150 [ 1490.717299][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1490.723184][T29630] [ 1490.725513][T29630] Uninit was stored to memory at: [ 1490.730551][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1490.736276][T29630] __msan_chain_origin+0x50/0x90 [ 1490.741225][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1490.745824][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1490.750771][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1490.755630][T29630] do_syscall_64+0xb0/0x150 [ 1490.760151][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1490.766063][T29630] [ 1490.768416][T29630] Uninit was stored to memory at: [ 1490.773451][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1490.779178][T29630] __msan_chain_origin+0x50/0x90 [ 1490.784127][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1490.788724][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1490.793678][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1490.798537][T29630] do_syscall_64+0xb0/0x150 [ 1490.803055][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1490.808942][T29630] [ 1490.811267][T29630] Uninit was stored to memory at: [ 1490.816302][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1490.822030][T29630] __msan_chain_origin+0x50/0x90 [ 1490.826979][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1490.831577][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1490.836525][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1490.841387][T29630] do_syscall_64+0xb0/0x150 [ 1490.845902][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1490.851788][T29630] [ 1490.854118][T29630] Uninit was stored to memory at: [ 1490.859153][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1490.864877][T29630] __msan_chain_origin+0x50/0x90 [ 1490.869824][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1490.874423][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1490.879421][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1490.884280][T29630] do_syscall_64+0xb0/0x150 [ 1490.888795][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1490.894686][T29630] [ 1490.897012][T29630] Uninit was stored to memory at: [ 1490.902062][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1490.907786][T29630] __msan_chain_origin+0x50/0x90 [ 1490.912732][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1490.917336][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1490.922291][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1490.927153][T29630] do_syscall_64+0xb0/0x150 [ 1490.931675][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1490.937562][T29630] [ 1490.939894][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1490.946585][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1490.951013][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1491.268089][T29630] not chained 600000 origins [ 1491.272745][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1491.281421][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1491.291485][T29630] Call Trace: [ 1491.294802][T29630] dump_stack+0x1df/0x240 [ 1491.299158][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1491.304905][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1491.310042][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1491.315960][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1491.321261][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1491.326479][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1491.332300][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1491.338386][T29630] ? kfree+0x61/0x30f0 [ 1491.342479][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1491.347613][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1491.353198][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1491.359296][T29630] ? _copy_from_user+0x15b/0x260 [ 1491.364251][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1491.369377][T29630] __msan_chain_origin+0x50/0x90 [ 1491.374337][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1491.379003][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1491.384313][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1491.389351][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1491.394394][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1491.400324][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1491.405315][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1491.410196][T29630] do_syscall_64+0xb0/0x150 [ 1491.414726][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1491.420629][T29630] RIP: 0033:0x45c1d9 [ 1491.424518][T29630] Code: Bad RIP value. [ 1491.428588][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1491.437017][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1491.445007][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1491.452991][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1491.460976][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1491.468959][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1491.476974][T29630] Uninit was stored to memory at: [ 1491.482022][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1491.487752][T29630] __msan_chain_origin+0x50/0x90 [ 1491.492712][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1491.497312][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1491.502266][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1491.507130][T29630] do_syscall_64+0xb0/0x150 [ 1491.511681][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1491.517588][T29630] [ 1491.519920][T29630] Uninit was stored to memory at: [ 1491.524964][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1491.530716][T29630] __msan_chain_origin+0x50/0x90 [ 1491.535669][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1491.540273][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1491.545222][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1491.550267][T29630] do_syscall_64+0xb0/0x150 [ 1491.554786][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1491.560674][T29630] [ 1491.563013][T29630] Uninit was stored to memory at: [ 1491.568055][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1491.573789][T29630] __msan_chain_origin+0x50/0x90 [ 1491.578779][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1491.583390][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1491.588351][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1491.593239][T29630] do_syscall_64+0xb0/0x150 [ 1491.597762][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1491.603653][T29630] [ 1491.605983][T29630] Uninit was stored to memory at: [ 1491.611048][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1491.616782][T29630] __msan_chain_origin+0x50/0x90 [ 1491.621736][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1491.626345][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1491.631300][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1491.636164][T29630] do_syscall_64+0xb0/0x150 [ 1491.640684][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1491.646570][T29630] [ 1491.648947][T29630] Uninit was stored to memory at: [ 1491.653994][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1491.659731][T29630] __msan_chain_origin+0x50/0x90 [ 1491.664683][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1491.669286][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1491.674243][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1491.679111][T29630] do_syscall_64+0xb0/0x150 [ 1491.683630][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1491.689519][T29630] [ 1491.691847][T29630] Uninit was stored to memory at: [ 1491.696890][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1491.702663][T29630] __msan_chain_origin+0x50/0x90 [ 1491.707615][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1491.712228][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1491.717186][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1491.722052][T29630] do_syscall_64+0xb0/0x150 [ 1491.726568][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1491.732454][T29630] [ 1491.734781][T29630] Uninit was stored to memory at: [ 1491.739819][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1491.745549][T29630] __msan_chain_origin+0x50/0x90 [ 1491.750498][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1491.755104][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1491.760051][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1491.764910][T29630] do_syscall_64+0xb0/0x150 [ 1491.769428][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1491.775317][T29630] [ 1491.777670][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1491.784359][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1491.788784][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1492.033769][T29630] not chained 610000 origins [ 1492.038411][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1492.047082][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1492.057139][T29630] Call Trace: [ 1492.060450][T29630] dump_stack+0x1df/0x240 [ 1492.064809][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1492.070546][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1492.075672][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1492.081593][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1492.086921][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1492.092143][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1492.097971][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1492.104060][T29630] ? kfree+0x61/0x30f0 [ 1492.108148][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1492.113273][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1492.118839][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1492.124931][T29630] ? _copy_from_user+0x15b/0x260 [ 1492.129883][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1492.135027][T29630] __msan_chain_origin+0x50/0x90 [ 1492.139986][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1492.144647][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1492.149957][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1492.154992][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1492.160029][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1492.165961][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1492.170931][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1492.175801][T29630] do_syscall_64+0xb0/0x150 [ 1492.180324][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1492.186223][T29630] RIP: 0033:0x45c1d9 [ 1492.190113][T29630] Code: Bad RIP value. [ 1492.194180][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1492.202598][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1492.210574][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1492.218551][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1492.226534][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1492.234515][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1492.242511][T29630] Uninit was stored to memory at: [ 1492.247557][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1492.253288][T29630] __msan_chain_origin+0x50/0x90 [ 1492.258242][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1492.262841][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1492.267800][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1492.272664][T29630] do_syscall_64+0xb0/0x150 [ 1492.277186][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1492.283103][T29630] [ 1492.285433][T29630] Uninit was stored to memory at: [ 1492.290472][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1492.296202][T29630] __msan_chain_origin+0x50/0x90 [ 1492.301155][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1492.305761][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1492.310718][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1492.315581][T29630] do_syscall_64+0xb0/0x150 [ 1492.320102][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1492.325994][T29630] [ 1492.328326][T29630] Uninit was stored to memory at: [ 1492.333370][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1492.339190][T29630] __msan_chain_origin+0x50/0x90 [ 1492.344142][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1492.348747][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1492.353705][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1492.358569][T29630] do_syscall_64+0xb0/0x150 [ 1492.363087][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1492.368991][T29630] [ 1492.371350][T29630] Uninit was stored to memory at: [ 1492.376417][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1492.382181][T29630] __msan_chain_origin+0x50/0x90 [ 1492.387131][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1492.391851][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1492.397153][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1492.402022][T29630] do_syscall_64+0xb0/0x150 [ 1492.406544][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1492.412438][T29630] [ 1492.414773][T29630] Uninit was stored to memory at: [ 1492.419814][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1492.425559][T29630] __msan_chain_origin+0x50/0x90 [ 1492.430510][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1492.435118][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1492.440073][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1492.444937][T29630] do_syscall_64+0xb0/0x150 [ 1492.449455][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1492.455346][T29630] [ 1492.457673][T29630] Uninit was stored to memory at: [ 1492.462723][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1492.468452][T29630] __msan_chain_origin+0x50/0x90 [ 1492.473401][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1492.477999][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1492.482947][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1492.487810][T29630] do_syscall_64+0xb0/0x150 [ 1492.492324][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1492.498210][T29630] [ 1492.500537][T29630] Uninit was stored to memory at: [ 1492.505576][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1492.511307][T29630] __msan_chain_origin+0x50/0x90 [ 1492.516258][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1492.520858][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1492.525807][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1492.530666][T29630] do_syscall_64+0xb0/0x150 [ 1492.535191][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1492.541074][T29630] [ 1492.543402][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1492.550088][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1492.554514][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1492.844096][T29630] not chained 620000 origins [ 1492.848750][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1492.857447][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1492.867513][T29630] Call Trace: [ 1492.870826][T29630] dump_stack+0x1df/0x240 [ 1492.875182][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1492.880919][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1492.886045][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1492.891973][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1492.897281][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1492.902501][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1492.908337][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1492.914418][T29630] ? kfree+0x61/0x30f0 [ 1492.918508][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1492.923649][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1492.929235][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1492.935346][T29630] ? _copy_from_user+0x15b/0x260 [ 1492.940297][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1492.945424][T29630] __msan_chain_origin+0x50/0x90 [ 1492.950381][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1492.955044][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1492.960349][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1492.965383][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1492.970507][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1492.976419][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1492.981392][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1492.986280][T29630] do_syscall_64+0xb0/0x150 [ 1492.990806][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1492.996712][T29630] RIP: 0033:0x45c1d9 [ 1493.000604][T29630] Code: Bad RIP value. [ 1493.004674][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1493.013099][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1493.021079][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1493.029056][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1493.037033][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1493.045023][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1493.053020][T29630] Uninit was stored to memory at: [ 1493.058061][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1493.063791][T29630] __msan_chain_origin+0x50/0x90 [ 1493.068744][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1493.073343][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1493.078288][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1493.083148][T29630] do_syscall_64+0xb0/0x150 [ 1493.087661][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1493.093546][T29630] [ 1493.095873][T29630] Uninit was stored to memory at: [ 1493.100912][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1493.106638][T29630] __msan_chain_origin+0x50/0x90 [ 1493.111584][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1493.116184][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1493.121139][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1493.125998][T29630] do_syscall_64+0xb0/0x150 [ 1493.130510][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1493.136420][T29630] [ 1493.138765][T29630] Uninit was stored to memory at: [ 1493.143800][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1493.149528][T29630] __msan_chain_origin+0x50/0x90 [ 1493.154474][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1493.159072][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1493.164018][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1493.168880][T29630] do_syscall_64+0xb0/0x150 [ 1493.173394][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1493.179279][T29630] [ 1493.181615][T29630] Uninit was stored to memory at: [ 1493.186648][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1493.192374][T29630] __msan_chain_origin+0x50/0x90 [ 1493.197322][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1493.201925][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1493.206872][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1493.211755][T29630] do_syscall_64+0xb0/0x150 [ 1493.216275][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1493.222161][T29630] [ 1493.224487][T29630] Uninit was stored to memory at: [ 1493.229522][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1493.235249][T29630] __msan_chain_origin+0x50/0x90 [ 1493.240211][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1493.244809][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1493.249754][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1493.254620][T29630] do_syscall_64+0xb0/0x150 [ 1493.259140][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1493.265027][T29630] [ 1493.267351][T29630] Uninit was stored to memory at: [ 1493.272385][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1493.278115][T29630] __msan_chain_origin+0x50/0x90 [ 1493.283066][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1493.287669][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1493.292618][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1493.297475][T29630] do_syscall_64+0xb0/0x150 [ 1493.301989][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1493.307894][T29630] [ 1493.310225][T29630] Uninit was stored to memory at: [ 1493.315257][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1493.320983][T29630] __msan_chain_origin+0x50/0x90 [ 1493.325929][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1493.330530][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1493.335478][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1493.340339][T29630] do_syscall_64+0xb0/0x150 [ 1493.344884][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1493.350769][T29630] [ 1493.353101][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1493.359791][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1493.364222][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1493.880794][T29630] not chained 630000 origins [ 1493.885449][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1493.894158][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1493.904267][T29630] Call Trace: [ 1493.907592][T29630] dump_stack+0x1df/0x240 [ 1493.911957][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1493.917701][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1493.922834][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1493.928749][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1493.934055][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1493.939275][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1493.945106][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1493.951222][T29630] ? kfree+0x61/0x30f0 [ 1493.955359][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1493.960513][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1493.966074][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1493.972166][T29630] ? _copy_from_user+0x15b/0x260 [ 1493.977129][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1493.982264][T29630] __msan_chain_origin+0x50/0x90 [ 1493.987226][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1493.991886][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1493.997231][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1494.002266][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1494.007303][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1494.013221][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.018193][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.023063][T29630] do_syscall_64+0xb0/0x150 [ 1494.027607][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.033503][T29630] RIP: 0033:0x45c1d9 [ 1494.037401][T29630] Code: Bad RIP value. [ 1494.041486][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1494.049909][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1494.057895][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1494.065871][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1494.073847][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1494.081821][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1494.089826][T29630] Uninit was stored to memory at: [ 1494.094866][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1494.100594][T29630] __msan_chain_origin+0x50/0x90 [ 1494.105542][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1494.110139][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.115097][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.119960][T29630] do_syscall_64+0xb0/0x150 [ 1494.124482][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.130365][T29630] [ 1494.132695][T29630] Uninit was stored to memory at: [ 1494.137729][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1494.143453][T29630] __msan_chain_origin+0x50/0x90 [ 1494.148401][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1494.153002][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.157949][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.162815][T29630] do_syscall_64+0xb0/0x150 [ 1494.167329][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.173217][T29630] [ 1494.175542][T29630] Uninit was stored to memory at: [ 1494.180580][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1494.186307][T29630] __msan_chain_origin+0x50/0x90 [ 1494.191255][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1494.195854][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.200801][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.205660][T29630] do_syscall_64+0xb0/0x150 [ 1494.210178][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.216066][T29630] [ 1494.218392][T29630] Uninit was stored to memory at: [ 1494.223426][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1494.229154][T29630] __msan_chain_origin+0x50/0x90 [ 1494.234112][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1494.238721][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.243667][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.248525][T29630] do_syscall_64+0xb0/0x150 [ 1494.253042][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.258934][T29630] [ 1494.261262][T29630] Uninit was stored to memory at: [ 1494.266296][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1494.272023][T29630] __msan_chain_origin+0x50/0x90 [ 1494.276972][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1494.281573][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.286520][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.291384][T29630] do_syscall_64+0xb0/0x150 [ 1494.295904][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.301791][T29630] [ 1494.304117][T29630] Uninit was stored to memory at: [ 1494.309153][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1494.314906][T29630] __msan_chain_origin+0x50/0x90 [ 1494.319855][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1494.324460][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.329414][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.334277][T29630] do_syscall_64+0xb0/0x150 [ 1494.338792][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.344677][T29630] [ 1494.347004][T29630] Uninit was stored to memory at: [ 1494.352043][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1494.357771][T29630] __msan_chain_origin+0x50/0x90 [ 1494.362720][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1494.367320][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.372294][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.377157][T29630] do_syscall_64+0xb0/0x150 [ 1494.381682][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.387569][T29630] [ 1494.389908][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1494.396634][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1494.401082][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1494.655067][T29630] not chained 640000 origins [ 1494.659730][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1494.668409][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.678482][T29630] Call Trace: [ 1494.681804][T29630] dump_stack+0x1df/0x240 [ 1494.686227][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1494.691974][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1494.697111][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1494.703040][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1494.708358][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1494.713588][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1494.719508][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1494.725628][T29630] ? kfree+0x61/0x30f0 [ 1494.729771][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1494.734953][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1494.740529][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1494.746632][T29630] ? _copy_from_user+0x15b/0x260 [ 1494.751604][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1494.756746][T29630] __msan_chain_origin+0x50/0x90 [ 1494.761724][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1494.766461][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1494.771778][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1494.776828][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1494.781884][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1494.787877][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.792902][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.797793][T29630] do_syscall_64+0xb0/0x150 [ 1494.802372][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.808291][T29630] RIP: 0033:0x45c1d9 [ 1494.812224][T29630] Code: Bad RIP value. [ 1494.816342][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1494.824781][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1494.832775][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1494.840776][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1494.848775][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1494.856772][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1494.864782][T29630] Uninit was stored to memory at: [ 1494.869861][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1494.875721][T29630] __msan_chain_origin+0x50/0x90 [ 1494.880700][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1494.885321][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.890328][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.895206][T29630] do_syscall_64+0xb0/0x150 [ 1494.899763][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.906108][T29630] [ 1494.908457][T29630] Uninit was stored to memory at: [ 1494.913521][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1494.919268][T29630] __msan_chain_origin+0x50/0x90 [ 1494.924238][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1494.928861][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.933828][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.938720][T29630] do_syscall_64+0xb0/0x150 [ 1494.943261][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.949167][T29630] [ 1494.951523][T29630] Uninit was stored to memory at: [ 1494.956566][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1494.962301][T29630] __msan_chain_origin+0x50/0x90 [ 1494.967254][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1494.971860][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1494.976813][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1494.981688][T29630] do_syscall_64+0xb0/0x150 [ 1494.986214][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.992136][T29630] [ 1494.994471][T29630] Uninit was stored to memory at: [ 1494.999523][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1495.005271][T29630] __msan_chain_origin+0x50/0x90 [ 1495.010233][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.014851][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.019817][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.024701][T29630] do_syscall_64+0xb0/0x150 [ 1495.029247][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.035150][T29630] [ 1495.037506][T29630] Uninit was stored to memory at: [ 1495.042557][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1495.048296][T29630] __msan_chain_origin+0x50/0x90 [ 1495.053246][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.057849][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.062793][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.067692][T29630] do_syscall_64+0xb0/0x150 [ 1495.072213][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.078103][T29630] [ 1495.080438][T29630] Uninit was stored to memory at: [ 1495.085476][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1495.091203][T29630] __msan_chain_origin+0x50/0x90 [ 1495.096155][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.100753][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.105702][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.110568][T29630] do_syscall_64+0xb0/0x150 [ 1495.115085][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.120972][T29630] [ 1495.123296][T29630] Uninit was stored to memory at: [ 1495.128333][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1495.134066][T29630] __msan_chain_origin+0x50/0x90 [ 1495.139015][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.143616][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.148564][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.153423][T29630] do_syscall_64+0xb0/0x150 [ 1495.157940][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.163847][T29630] [ 1495.166188][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1495.172901][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1495.177329][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1495.472764][T29630] not chained 650000 origins [ 1495.477416][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1495.486102][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1495.496195][T29630] Call Trace: [ 1495.499527][T29630] dump_stack+0x1df/0x240 [ 1495.503897][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1495.509646][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1495.514830][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1495.520747][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1495.526074][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1495.531297][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1495.537122][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1495.543206][T29630] ? kfree+0x61/0x30f0 [ 1495.547298][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1495.552427][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1495.557999][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1495.564091][T29630] ? _copy_from_user+0x15b/0x260 [ 1495.569064][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1495.574190][T29630] __msan_chain_origin+0x50/0x90 [ 1495.579157][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.583832][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1495.589140][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1495.594176][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1495.599215][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1495.605131][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.610100][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.614980][T29630] do_syscall_64+0xb0/0x150 [ 1495.619521][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.625422][T29630] RIP: 0033:0x45c1d9 [ 1495.629316][T29630] Code: Bad RIP value. [ 1495.633388][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1495.641815][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1495.649808][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1495.657802][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1495.665829][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1495.673820][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1495.681826][T29630] Uninit was stored to memory at: [ 1495.686871][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1495.692626][T29630] __msan_chain_origin+0x50/0x90 [ 1495.697573][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.702175][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.707133][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.711996][T29630] do_syscall_64+0xb0/0x150 [ 1495.716512][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.722405][T29630] [ 1495.724734][T29630] Uninit was stored to memory at: [ 1495.729811][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1495.735550][T29630] __msan_chain_origin+0x50/0x90 [ 1495.740500][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.745099][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.750043][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.754905][T29630] do_syscall_64+0xb0/0x150 [ 1495.759418][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.765305][T29630] [ 1495.767631][T29630] Uninit was stored to memory at: [ 1495.772675][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1495.778406][T29630] __msan_chain_origin+0x50/0x90 [ 1495.783354][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.787951][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.792921][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.797781][T29630] do_syscall_64+0xb0/0x150 [ 1495.802350][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.808240][T29630] [ 1495.810565][T29630] Uninit was stored to memory at: [ 1495.815601][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1495.821327][T29630] __msan_chain_origin+0x50/0x90 [ 1495.826278][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.830875][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.835821][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.840679][T29630] do_syscall_64+0xb0/0x150 [ 1495.845192][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.851081][T29630] [ 1495.853409][T29630] Uninit was stored to memory at: [ 1495.858449][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1495.864179][T29630] __msan_chain_origin+0x50/0x90 [ 1495.869136][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.873741][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.878694][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.883565][T29630] do_syscall_64+0xb0/0x150 [ 1495.888091][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.893984][T29630] [ 1495.896316][T29630] Uninit was stored to memory at: [ 1495.901365][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1495.907107][T29630] __msan_chain_origin+0x50/0x90 [ 1495.912103][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.916720][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.921675][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.926541][T29630] do_syscall_64+0xb0/0x150 [ 1495.931060][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.936952][T29630] [ 1495.939280][T29630] Uninit was stored to memory at: [ 1495.944320][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1495.950053][T29630] __msan_chain_origin+0x50/0x90 [ 1495.955013][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1495.959625][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1495.964571][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1495.969437][T29630] do_syscall_64+0xb0/0x150 [ 1495.973952][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.979862][T29630] [ 1495.982199][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1495.988885][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1495.993307][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1496.498501][T29630] not chained 660000 origins [ 1496.503164][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1496.511841][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1496.522002][T29630] Call Trace: [ 1496.525330][T29630] dump_stack+0x1df/0x240 [ 1496.529693][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1496.535441][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1496.540755][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1496.546691][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1496.552016][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1496.557241][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1496.563216][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1496.569333][T29630] ? kfree+0x61/0x30f0 [ 1496.573439][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1496.578584][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1496.584171][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1496.590278][T29630] ? _copy_from_user+0x15b/0x260 [ 1496.595244][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1496.600385][T29630] __msan_chain_origin+0x50/0x90 [ 1496.605392][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1496.610101][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1496.615522][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1496.620574][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1496.625629][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1496.631561][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1496.636548][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1496.641460][T29630] do_syscall_64+0xb0/0x150 [ 1496.645997][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1496.651908][T29630] RIP: 0033:0x45c1d9 [ 1496.655805][T29630] Code: Bad RIP value. [ 1496.659887][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1496.668315][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1496.676307][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1496.684309][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1496.692297][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1496.700293][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1496.708297][T29630] Uninit was stored to memory at: [ 1496.713352][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1496.719098][T29630] __msan_chain_origin+0x50/0x90 [ 1496.724058][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1496.728669][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1496.733626][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1496.738498][T29630] do_syscall_64+0xb0/0x150 [ 1496.743024][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1496.748914][T29630] [ 1496.751250][T29630] Uninit was stored to memory at: [ 1496.756299][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1496.762035][T29630] __msan_chain_origin+0x50/0x90 [ 1496.766991][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1496.771598][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1496.776556][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1496.781430][T29630] do_syscall_64+0xb0/0x150 [ 1496.785952][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1496.791851][T29630] [ 1496.794190][T29630] Uninit was stored to memory at: [ 1496.799233][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1496.804967][T29630] __msan_chain_origin+0x50/0x90 [ 1496.809925][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1496.814536][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1496.819494][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1496.824377][T29630] do_syscall_64+0xb0/0x150 [ 1496.828907][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1496.834801][T29630] [ 1496.837168][T29630] Uninit was stored to memory at: [ 1496.842215][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1496.847942][T29630] __msan_chain_origin+0x50/0x90 [ 1496.852907][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1496.857525][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1496.862476][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1496.867343][T29630] do_syscall_64+0xb0/0x150 [ 1496.871870][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1496.877787][T29630] [ 1496.880119][T29630] Uninit was stored to memory at: [ 1496.885157][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1496.890897][T29630] __msan_chain_origin+0x50/0x90 [ 1496.895903][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1496.900509][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1496.905462][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1496.910334][T29630] do_syscall_64+0xb0/0x150 [ 1496.914866][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1496.920762][T29630] [ 1496.923089][T29630] Uninit was stored to memory at: [ 1496.928128][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1496.933868][T29630] __msan_chain_origin+0x50/0x90 [ 1496.938818][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1496.943422][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1496.948363][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1496.953227][T29630] do_syscall_64+0xb0/0x150 [ 1496.957743][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1496.963629][T29630] [ 1496.965956][T29630] Uninit was stored to memory at: [ 1496.970993][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1496.976771][T29630] __msan_chain_origin+0x50/0x90 [ 1496.981729][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1496.986341][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1496.991292][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1496.996160][T29630] do_syscall_64+0xb0/0x150 [ 1497.000678][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1497.006583][T29630] [ 1497.008918][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1497.015607][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1497.020044][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1497.396817][T29630] not chained 670000 origins [ 1497.401487][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1497.410166][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1497.420243][T29630] Call Trace: [ 1497.423570][T29630] dump_stack+0x1df/0x240 [ 1497.427936][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1497.433687][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1497.438846][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1497.444760][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1497.450070][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1497.455298][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1497.461127][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1497.467234][T29630] ? kfree+0x61/0x30f0 [ 1497.471325][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1497.476453][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1497.482050][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1497.488155][T29630] ? _copy_from_user+0x15b/0x260 [ 1497.493132][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1497.498279][T29630] __msan_chain_origin+0x50/0x90 [ 1497.503262][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1497.507949][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1497.513264][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1497.518327][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1497.523390][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1497.529353][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1497.534371][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1497.539260][T29630] do_syscall_64+0xb0/0x150 [ 1497.543801][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1497.549715][T29630] RIP: 0033:0x45c1d9 [ 1497.553609][T29630] Code: Bad RIP value. [ 1497.557715][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1497.566146][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1497.574153][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1497.582151][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1497.590145][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1497.598148][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1497.606153][T29630] Uninit was stored to memory at: [ 1497.611205][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1497.616971][T29630] __msan_chain_origin+0x50/0x90 [ 1497.621931][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1497.626572][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1497.631541][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1497.636422][T29630] do_syscall_64+0xb0/0x150 [ 1497.640955][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1497.646887][T29630] [ 1497.649239][T29630] Uninit was stored to memory at: [ 1497.654290][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1497.660031][T29630] __msan_chain_origin+0x50/0x90 [ 1497.664994][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1497.669609][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1497.674570][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1497.679445][T29630] do_syscall_64+0xb0/0x150 [ 1497.683975][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1497.689863][T29630] [ 1497.692206][T29630] Uninit was stored to memory at: [ 1497.697245][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1497.702977][T29630] __msan_chain_origin+0x50/0x90 [ 1497.707926][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1497.712527][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1497.717475][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1497.722340][T29630] do_syscall_64+0xb0/0x150 [ 1497.726855][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1497.732748][T29630] [ 1497.735080][T29630] Uninit was stored to memory at: [ 1497.740124][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1497.745872][T29630] __msan_chain_origin+0x50/0x90 [ 1497.750831][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1497.755450][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1497.760407][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1497.765277][T29630] do_syscall_64+0xb0/0x150 [ 1497.769797][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1497.775694][T29630] [ 1497.778034][T29630] Uninit was stored to memory at: [ 1497.783084][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1497.788828][T29630] __msan_chain_origin+0x50/0x90 [ 1497.793796][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1497.798422][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1497.803391][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1497.808270][T29630] do_syscall_64+0xb0/0x150 [ 1497.812804][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1497.818709][T29630] [ 1497.821058][T29630] Uninit was stored to memory at: [ 1497.826111][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1497.831854][T29630] __msan_chain_origin+0x50/0x90 [ 1497.836816][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1497.841427][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1497.846393][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1497.851266][T29630] do_syscall_64+0xb0/0x150 [ 1497.855788][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1497.861675][T29630] [ 1497.864008][T29630] Uninit was stored to memory at: [ 1497.869051][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1497.874787][T29630] __msan_chain_origin+0x50/0x90 [ 1497.879740][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1497.884348][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1497.889301][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1497.894161][T29630] do_syscall_64+0xb0/0x150 [ 1497.898677][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1497.904568][T29630] [ 1497.906899][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1497.913639][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1497.918068][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1498.320711][T29630] not chained 680000 origins [ 1498.325371][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1498.334083][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.344155][T29630] Call Trace: [ 1498.347470][T29630] dump_stack+0x1df/0x240 [ 1498.351837][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1498.357590][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1498.362730][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1498.368644][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1498.373967][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1498.379193][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1498.385024][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1498.391108][T29630] ? kfree+0x61/0x30f0 [ 1498.395201][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1498.400337][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1498.405906][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1498.412000][T29630] ? _copy_from_user+0x15b/0x260 [ 1498.416958][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1498.422089][T29630] __msan_chain_origin+0x50/0x90 [ 1498.427047][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1498.431706][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1498.437013][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1498.442053][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1498.447101][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1498.453051][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1498.458037][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1498.462911][T29630] do_syscall_64+0xb0/0x150 [ 1498.467435][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1498.473342][T29630] RIP: 0033:0x45c1d9 [ 1498.477234][T29630] Code: Bad RIP value. [ 1498.481306][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1498.489747][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1498.497740][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1498.505728][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1498.513784][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1498.521778][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1498.529779][T29630] Uninit was stored to memory at: [ 1498.534868][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1498.540627][T29630] __msan_chain_origin+0x50/0x90 [ 1498.545584][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1498.550196][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1498.555160][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1498.560048][T29630] do_syscall_64+0xb0/0x150 [ 1498.564567][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1498.570458][T29630] [ 1498.572796][T29630] Uninit was stored to memory at: [ 1498.577846][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1498.583579][T29630] __msan_chain_origin+0x50/0x90 [ 1498.588532][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1498.593140][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1498.598091][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1498.602953][T29630] do_syscall_64+0xb0/0x150 [ 1498.607467][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1498.613357][T29630] [ 1498.615792][T29630] Uninit was stored to memory at: [ 1498.620831][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1498.626566][T29630] __msan_chain_origin+0x50/0x90 [ 1498.631513][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1498.636113][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1498.641065][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1498.645938][T29630] do_syscall_64+0xb0/0x150 [ 1498.650463][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1498.656355][T29630] [ 1498.658695][T29630] Uninit was stored to memory at: [ 1498.663737][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1498.669467][T29630] __msan_chain_origin+0x50/0x90 [ 1498.674418][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1498.679024][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1498.683976][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1498.688838][T29630] do_syscall_64+0xb0/0x150 [ 1498.693365][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1498.699264][T29630] [ 1498.701594][T29630] Uninit was stored to memory at: [ 1498.706637][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1498.712376][T29630] __msan_chain_origin+0x50/0x90 [ 1498.717328][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1498.721926][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1498.726874][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1498.731761][T29630] do_syscall_64+0xb0/0x150 [ 1498.736272][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1498.742187][T29630] [ 1498.744512][T29630] Uninit was stored to memory at: [ 1498.749555][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1498.755286][T29630] __msan_chain_origin+0x50/0x90 [ 1498.760236][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1498.764842][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1498.769799][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1498.774687][T29630] do_syscall_64+0xb0/0x150 [ 1498.779209][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1498.785100][T29630] [ 1498.787427][T29630] Uninit was stored to memory at: [ 1498.792464][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1498.798196][T29630] __msan_chain_origin+0x50/0x90 [ 1498.803146][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1498.807750][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1498.812875][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1498.817737][T29630] do_syscall_64+0xb0/0x150 [ 1498.822264][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1498.828150][T29630] [ 1498.830483][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1498.837173][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1498.841604][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1499.241488][T29630] not chained 690000 origins [ 1499.246144][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1499.254826][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1499.264902][T29630] Call Trace: [ 1499.268222][T29630] dump_stack+0x1df/0x240 [ 1499.272579][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1499.278317][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1499.283448][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1499.289364][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1499.294672][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1499.299885][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1499.305711][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1499.311795][T29630] ? kfree+0x61/0x30f0 [ 1499.315896][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1499.321027][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1499.326591][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1499.332693][T29630] ? _copy_from_user+0x15b/0x260 [ 1499.337645][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1499.342776][T29630] __msan_chain_origin+0x50/0x90 [ 1499.347733][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1499.352389][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1499.357701][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1499.362735][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1499.367775][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1499.373698][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1499.378729][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1499.383605][T29630] do_syscall_64+0xb0/0x150 [ 1499.388136][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1499.394043][T29630] RIP: 0033:0x45c1d9 [ 1499.397937][T29630] Code: Bad RIP value. [ 1499.402051][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1499.410489][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1499.418478][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1499.426463][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1499.434449][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1499.442447][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1499.450445][T29630] Uninit was stored to memory at: [ 1499.455513][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1499.461251][T29630] __msan_chain_origin+0x50/0x90 [ 1499.466220][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1499.470829][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1499.475788][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1499.480653][T29630] do_syscall_64+0xb0/0x150 [ 1499.485169][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1499.491067][T29630] [ 1499.493399][T29630] Uninit was stored to memory at: [ 1499.498443][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1499.504174][T29630] __msan_chain_origin+0x50/0x90 [ 1499.509157][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1499.513771][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1499.518728][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1499.523594][T29630] do_syscall_64+0xb0/0x150 [ 1499.528115][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1499.534004][T29630] [ 1499.536341][T29630] Uninit was stored to memory at: [ 1499.541378][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1499.547107][T29630] __msan_chain_origin+0x50/0x90 [ 1499.552058][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1499.556654][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1499.561621][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1499.566505][T29630] do_syscall_64+0xb0/0x150 [ 1499.571027][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1499.576913][T29630] [ 1499.579243][T29630] Uninit was stored to memory at: [ 1499.584278][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1499.590003][T29630] __msan_chain_origin+0x50/0x90 [ 1499.594952][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1499.599549][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1499.604496][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1499.609355][T29630] do_syscall_64+0xb0/0x150 [ 1499.613869][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1499.619755][T29630] [ 1499.622083][T29630] Uninit was stored to memory at: [ 1499.627131][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1499.632863][T29630] __msan_chain_origin+0x50/0x90 [ 1499.637809][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1499.642415][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1499.647368][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1499.652230][T29630] do_syscall_64+0xb0/0x150 [ 1499.656742][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1499.662628][T29630] [ 1499.664964][T29630] Uninit was stored to memory at: [ 1499.669997][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1499.675937][T29630] __msan_chain_origin+0x50/0x90 [ 1499.680883][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1499.685485][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1499.690430][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1499.695292][T29630] do_syscall_64+0xb0/0x150 [ 1499.699810][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1499.705700][T29630] [ 1499.708026][T29630] Uninit was stored to memory at: [ 1499.713061][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1499.718795][T29630] __msan_chain_origin+0x50/0x90 [ 1499.723752][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1499.728358][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1499.733309][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1499.738173][T29630] do_syscall_64+0xb0/0x150 [ 1499.742700][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1499.748598][T29630] [ 1499.750941][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1499.757643][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1499.762095][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1500.012769][T29630] not chained 700000 origins [ 1500.017552][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1500.026241][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1500.036513][T29630] Call Trace: [ 1500.039829][T29630] dump_stack+0x1df/0x240 [ 1500.044186][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1500.049927][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1500.055056][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1500.060970][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1500.066284][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1500.071509][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1500.077335][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1500.083416][T29630] ? kfree+0x61/0x30f0 [ 1500.087510][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1500.092661][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1500.098220][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1500.104320][T29630] ? _copy_from_user+0x15b/0x260 [ 1500.109274][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1500.114406][T29630] __msan_chain_origin+0x50/0x90 [ 1500.119362][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1500.124026][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1500.129335][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1500.134400][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1500.139448][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1500.145361][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1500.150342][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1500.155214][T29630] do_syscall_64+0xb0/0x150 [ 1500.159740][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1500.165640][T29630] RIP: 0033:0x45c1d9 [ 1500.169550][T29630] Code: Bad RIP value. [ 1500.173617][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1500.182045][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1500.190051][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1500.198034][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1500.206027][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1500.214018][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1500.222022][T29630] Uninit was stored to memory at: [ 1500.227062][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1500.232791][T29630] __msan_chain_origin+0x50/0x90 [ 1500.237738][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1500.242339][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1500.247284][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1500.252178][T29630] do_syscall_64+0xb0/0x150 [ 1500.256694][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1500.262587][T29630] [ 1500.264913][T29630] Uninit was stored to memory at: [ 1500.269950][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1500.275676][T29630] __msan_chain_origin+0x50/0x90 [ 1500.280622][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1500.285245][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1500.290196][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1500.295056][T29630] do_syscall_64+0xb0/0x150 [ 1500.299568][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1500.305451][T29630] [ 1500.307779][T29630] Uninit was stored to memory at: [ 1500.312814][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1500.318558][T29630] __msan_chain_origin+0x50/0x90 [ 1500.323510][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1500.328108][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1500.333078][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1500.337944][T29630] do_syscall_64+0xb0/0x150 [ 1500.342462][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1500.348348][T29630] [ 1500.351802][T29630] Uninit was stored to memory at: [ 1500.356842][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1500.362576][T29630] __msan_chain_origin+0x50/0x90 [ 1500.367525][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1500.372125][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1500.377073][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1500.381935][T29630] do_syscall_64+0xb0/0x150 [ 1500.386450][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1500.392337][T29630] [ 1500.394665][T29630] Uninit was stored to memory at: [ 1500.399701][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1500.405436][T29630] __msan_chain_origin+0x50/0x90 [ 1500.410392][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1500.414993][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1500.419951][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1500.424813][T29630] do_syscall_64+0xb0/0x150 [ 1500.429344][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1500.435240][T29630] [ 1500.437571][T29630] Uninit was stored to memory at: [ 1500.442614][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1500.448359][T29630] __msan_chain_origin+0x50/0x90 [ 1500.453318][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1500.457929][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1500.462876][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1500.467740][T29630] do_syscall_64+0xb0/0x150 [ 1500.472256][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1500.478145][T29630] [ 1500.480475][T29630] Uninit was stored to memory at: [ 1500.485512][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1500.491242][T29630] __msan_chain_origin+0x50/0x90 [ 1500.496192][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1500.500792][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1500.505742][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1500.510603][T29630] do_syscall_64+0xb0/0x150 [ 1500.515122][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1500.521007][T29630] [ 1500.523334][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1500.530032][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1500.534469][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1500.968463][T29630] not chained 710000 origins [ 1500.973118][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1500.981802][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1500.991908][T29630] Call Trace: [ 1500.995231][T29630] dump_stack+0x1df/0x240 [ 1500.999598][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1501.005337][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1501.010481][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1501.016411][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1501.021728][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1501.026974][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1501.032802][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1501.038886][T29630] ? kfree+0x61/0x30f0 [ 1501.042982][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1501.048144][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1501.053721][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1501.059810][T29630] ? _copy_from_user+0x15b/0x260 [ 1501.064766][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1501.069895][T29630] __msan_chain_origin+0x50/0x90 [ 1501.074854][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1501.079526][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1501.084836][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1501.089887][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1501.094929][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1501.100846][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1501.105820][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1501.110700][T29630] do_syscall_64+0xb0/0x150 [ 1501.115229][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1501.121128][T29630] RIP: 0033:0x45c1d9 [ 1501.125020][T29630] Code: Bad RIP value. [ 1501.129088][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1501.137512][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1501.145499][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1501.153504][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1501.161485][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1501.169465][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1501.177469][T29630] Uninit was stored to memory at: [ 1501.182521][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1501.188258][T29630] __msan_chain_origin+0x50/0x90 [ 1501.193207][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1501.197813][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1501.202762][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1501.207629][T29630] do_syscall_64+0xb0/0x150 [ 1501.212157][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1501.218047][T29630] [ 1501.220378][T29630] Uninit was stored to memory at: [ 1501.225445][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1501.231176][T29630] __msan_chain_origin+0x50/0x90 [ 1501.236133][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1501.240736][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1501.245686][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1501.250576][T29630] do_syscall_64+0xb0/0x150 [ 1501.255102][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1501.261002][T29630] [ 1501.263340][T29630] Uninit was stored to memory at: [ 1501.268384][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1501.274127][T29630] __msan_chain_origin+0x50/0x90 [ 1501.279082][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1501.283688][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1501.288642][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1501.293510][T29630] do_syscall_64+0xb0/0x150 [ 1501.298027][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1501.303920][T29630] [ 1501.306250][T29630] Uninit was stored to memory at: [ 1501.311294][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1501.317023][T29630] __msan_chain_origin+0x50/0x90 [ 1501.321974][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1501.326576][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1501.331551][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1501.336446][T29630] do_syscall_64+0xb0/0x150 [ 1501.340967][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1501.346893][T29630] [ 1501.349229][T29630] Uninit was stored to memory at: [ 1501.354266][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1501.360002][T29630] __msan_chain_origin+0x50/0x90 [ 1501.364961][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1501.369568][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1501.374516][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1501.379407][T29630] do_syscall_64+0xb0/0x150 [ 1501.383954][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1501.389862][T29630] [ 1501.392199][T29630] Uninit was stored to memory at: [ 1501.397255][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1501.402991][T29630] __msan_chain_origin+0x50/0x90 [ 1501.407977][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1501.412593][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1501.417548][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1501.422420][T29630] do_syscall_64+0xb0/0x150 [ 1501.426974][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1501.432866][T29630] [ 1501.435209][T29630] Uninit was stored to memory at: [ 1501.440255][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1501.445989][T29630] __msan_chain_origin+0x50/0x90 [ 1501.450948][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1501.455560][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1501.460516][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1501.465387][T29630] do_syscall_64+0xb0/0x150 [ 1501.469917][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1501.475821][T29630] [ 1501.478160][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1501.484870][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1501.489319][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1501.859071][T29630] not chained 720000 origins [ 1501.863718][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1501.872396][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1501.882458][T29630] Call Trace: [ 1501.885775][T29630] dump_stack+0x1df/0x240 [ 1501.890135][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1501.895869][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1501.901001][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1501.906927][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1501.912232][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1501.917444][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1501.923270][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1501.929351][T29630] ? kfree+0x61/0x30f0 [ 1501.933439][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1501.938563][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1501.944128][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1501.950214][T29630] ? _copy_from_user+0x15b/0x260 [ 1501.955163][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1501.960293][T29630] __msan_chain_origin+0x50/0x90 [ 1501.965338][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1501.970001][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1501.975309][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1501.980368][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1501.985406][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1501.991317][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1501.996311][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1502.001187][T29630] do_syscall_64+0xb0/0x150 [ 1502.005713][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1502.011617][T29630] RIP: 0033:0x45c1d9 [ 1502.015512][T29630] Code: Bad RIP value. [ 1502.019586][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1502.028010][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1502.035992][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1502.043976][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1502.051964][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1502.059952][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1502.067959][T29630] Uninit was stored to memory at: [ 1502.073009][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1502.078753][T29630] __msan_chain_origin+0x50/0x90 [ 1502.083705][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1502.088312][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1502.093260][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1502.098149][T29630] do_syscall_64+0xb0/0x150 [ 1502.102665][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1502.108577][T29630] [ 1502.110911][T29630] Uninit was stored to memory at: [ 1502.115954][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1502.121689][T29630] __msan_chain_origin+0x50/0x90 [ 1502.126647][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1502.131246][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1502.136197][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1502.141091][T29630] do_syscall_64+0xb0/0x150 [ 1502.145614][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1502.151501][T29630] [ 1502.153884][T29630] Uninit was stored to memory at: [ 1502.158954][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1502.164692][T29630] __msan_chain_origin+0x50/0x90 [ 1502.169651][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1502.174257][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1502.179209][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1502.184075][T29630] do_syscall_64+0xb0/0x150 [ 1502.188591][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1502.194479][T29630] [ 1502.196809][T29630] Uninit was stored to memory at: [ 1502.201851][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1502.207587][T29630] __msan_chain_origin+0x50/0x90 [ 1502.212540][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1502.217148][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1502.222115][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1502.226988][T29630] do_syscall_64+0xb0/0x150 [ 1502.231514][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1502.237407][T29630] [ 1502.239753][T29630] Uninit was stored to memory at: [ 1502.244803][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1502.250543][T29630] __msan_chain_origin+0x50/0x90 [ 1502.255497][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1502.260100][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1502.265055][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1502.269917][T29630] do_syscall_64+0xb0/0x150 [ 1502.274466][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1502.280352][T29630] [ 1502.282679][T29630] Uninit was stored to memory at: [ 1502.287724][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1502.293459][T29630] __msan_chain_origin+0x50/0x90 [ 1502.298405][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1502.303006][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1502.307954][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1502.312817][T29630] do_syscall_64+0xb0/0x150 [ 1502.317333][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1502.323221][T29630] [ 1502.325549][T29630] Uninit was stored to memory at: [ 1502.330585][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1502.336313][T29630] __msan_chain_origin+0x50/0x90 [ 1502.341262][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1502.345866][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1502.350812][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1502.355676][T29630] do_syscall_64+0xb0/0x150 [ 1502.360192][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1502.366076][T29630] [ 1502.368404][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1502.375087][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1502.379508][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1502.770262][T29630] not chained 730000 origins [ 1502.774915][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1502.783588][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1502.793672][T29630] Call Trace: [ 1502.796987][T29630] dump_stack+0x1df/0x240 [ 1502.801339][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1502.807076][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1502.812208][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1502.818121][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1502.823421][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1502.828639][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1502.834470][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1502.840558][T29630] ? kfree+0x61/0x30f0 [ 1502.844671][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1502.849811][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1502.855417][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1502.861523][T29630] ? _copy_from_user+0x15b/0x260 [ 1502.866487][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1502.871618][T29630] __msan_chain_origin+0x50/0x90 [ 1502.876579][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1502.881378][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1502.886697][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1502.891739][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1502.896776][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1502.902691][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1502.907667][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1502.912592][T29630] do_syscall_64+0xb0/0x150 [ 1502.917116][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1502.923021][T29630] RIP: 0033:0x45c1d9 [ 1502.926935][T29630] Code: Bad RIP value. [ 1502.931006][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1502.939450][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1502.947440][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1502.955429][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1502.963414][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1502.971401][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1502.979406][T29630] Uninit was stored to memory at: [ 1502.984471][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1502.990223][T29630] __msan_chain_origin+0x50/0x90 [ 1502.995195][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1502.999841][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1503.004795][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1503.009659][T29630] do_syscall_64+0xb0/0x150 [ 1503.014180][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1503.020091][T29630] [ 1503.022420][T29630] Uninit was stored to memory at: [ 1503.027462][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1503.033196][T29630] __msan_chain_origin+0x50/0x90 [ 1503.038155][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1503.042768][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1503.047726][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1503.052599][T29630] do_syscall_64+0xb0/0x150 [ 1503.057116][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1503.063006][T29630] [ 1503.065335][T29630] Uninit was stored to memory at: [ 1503.070371][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1503.076103][T29630] __msan_chain_origin+0x50/0x90 [ 1503.081056][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1503.085659][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1503.090609][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1503.095479][T29630] do_syscall_64+0xb0/0x150 [ 1503.099997][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1503.105885][T29630] [ 1503.108213][T29630] Uninit was stored to memory at: [ 1503.113260][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1503.119021][T29630] __msan_chain_origin+0x50/0x90 [ 1503.123972][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1503.128578][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1503.133562][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1503.138448][T29630] do_syscall_64+0xb0/0x150 [ 1503.142984][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1503.148871][T29630] [ 1503.151205][T29630] Uninit was stored to memory at: [ 1503.156243][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1503.162068][T29630] __msan_chain_origin+0x50/0x90 [ 1503.167042][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1503.171640][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1503.176589][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1503.181451][T29630] do_syscall_64+0xb0/0x150 [ 1503.185965][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1503.191856][T29630] [ 1503.194194][T29630] Uninit was stored to memory at: [ 1503.199233][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1503.204967][T29630] __msan_chain_origin+0x50/0x90 [ 1503.209937][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1503.214538][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1503.219497][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1503.224369][T29630] do_syscall_64+0xb0/0x150 [ 1503.228892][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1503.234783][T29630] [ 1503.237112][T29630] Uninit was stored to memory at: [ 1503.242181][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1503.247923][T29630] __msan_chain_origin+0x50/0x90 [ 1503.252872][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1503.257474][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1503.262420][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1503.267285][T29630] do_syscall_64+0xb0/0x150 [ 1503.271805][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1503.277709][T29630] [ 1503.280048][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1503.286739][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1503.291166][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1503.694744][T29630] not chained 740000 origins [ 1503.699598][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1503.708273][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1503.718343][T29630] Call Trace: [ 1503.721666][T29630] dump_stack+0x1df/0x240 [ 1503.726022][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1503.731795][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1503.736925][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1503.742846][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1503.748151][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1503.753366][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1503.759204][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1503.765298][T29630] ? kfree+0x61/0x30f0 [ 1503.769400][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1503.774562][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1503.780126][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1503.786222][T29630] ? _copy_from_user+0x15b/0x260 [ 1503.791174][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1503.796306][T29630] __msan_chain_origin+0x50/0x90 [ 1503.801270][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1503.805936][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1503.811253][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1503.816298][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1503.821355][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1503.827302][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1503.832282][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1503.837157][T29630] do_syscall_64+0xb0/0x150 [ 1503.841720][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1503.847636][T29630] RIP: 0033:0x45c1d9 [ 1503.851542][T29630] Code: Bad RIP value. [ 1503.855655][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1503.864086][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1503.872106][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1503.880139][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1503.888124][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1503.896115][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1503.904122][T29630] Uninit was stored to memory at: [ 1503.909164][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1503.914900][T29630] __msan_chain_origin+0x50/0x90 [ 1503.919859][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1503.924462][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1503.929427][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1503.934290][T29630] do_syscall_64+0xb0/0x150 [ 1503.938809][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1503.944703][T29630] [ 1503.947038][T29630] Uninit was stored to memory at: [ 1503.952090][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1503.957842][T29630] __msan_chain_origin+0x50/0x90 [ 1503.962840][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1503.967451][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1503.972413][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1503.977286][T29630] do_syscall_64+0xb0/0x150 [ 1503.981815][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1503.987733][T29630] [ 1503.990099][T29630] Uninit was stored to memory at: [ 1503.995148][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1504.000891][T29630] __msan_chain_origin+0x50/0x90 [ 1504.005852][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1504.010456][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1504.015416][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1504.020311][T29630] do_syscall_64+0xb0/0x150 [ 1504.024856][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1504.030759][T29630] [ 1504.033100][T29630] Uninit was stored to memory at: [ 1504.038158][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1504.043939][T29630] __msan_chain_origin+0x50/0x90 [ 1504.048899][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1504.053520][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1504.058516][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1504.063401][T29630] do_syscall_64+0xb0/0x150 [ 1504.067929][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1504.073823][T29630] [ 1504.076161][T29630] Uninit was stored to memory at: [ 1504.081220][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1504.086971][T29630] __msan_chain_origin+0x50/0x90 [ 1504.091926][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1504.096527][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1504.101478][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1504.106342][T29630] do_syscall_64+0xb0/0x150 [ 1504.110872][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1504.116764][T29630] [ 1504.119092][T29630] Uninit was stored to memory at: [ 1504.124154][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1504.129886][T29630] __msan_chain_origin+0x50/0x90 [ 1504.134834][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1504.139460][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1504.144414][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1504.149281][T29630] do_syscall_64+0xb0/0x150 [ 1504.153797][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1504.159689][T29630] [ 1504.162030][T29630] Uninit was stored to memory at: [ 1504.167072][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1504.172800][T29630] __msan_chain_origin+0x50/0x90 [ 1504.177746][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1504.182347][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1504.187300][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1504.192160][T29630] do_syscall_64+0xb0/0x150 [ 1504.196673][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1504.202559][T29630] [ 1504.204886][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1504.211573][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1504.216001][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1504.604426][T29630] not chained 750000 origins [ 1504.609080][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1504.617755][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1504.627814][T29630] Call Trace: [ 1504.631128][T29630] dump_stack+0x1df/0x240 [ 1504.635490][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1504.641226][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1504.646356][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1504.652278][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1504.657580][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1504.662795][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1504.668618][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1504.674706][T29630] ? kfree+0x61/0x30f0 [ 1504.678797][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1504.683928][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1504.689500][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1504.695588][T29630] ? _copy_from_user+0x15b/0x260 [ 1504.700543][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1504.705680][T29630] __msan_chain_origin+0x50/0x90 [ 1504.710640][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1504.715308][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1504.720615][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1504.725653][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1504.730701][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1504.736616][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1504.741590][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1504.746461][T29630] do_syscall_64+0xb0/0x150 [ 1504.750987][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1504.756886][T29630] RIP: 0033:0x45c1d9 [ 1504.760783][T29630] Code: Bad RIP value. [ 1504.764860][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1504.773281][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1504.781258][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1504.789241][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1504.797220][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1504.805202][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1504.813195][T29630] Uninit was stored to memory at: [ 1504.818235][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1504.823963][T29630] __msan_chain_origin+0x50/0x90 [ 1504.828911][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1504.833515][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1504.838464][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1504.843330][T29630] do_syscall_64+0xb0/0x150 [ 1504.847848][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1504.853735][T29630] [ 1504.856063][T29630] Uninit was stored to memory at: [ 1504.861109][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1504.866839][T29630] __msan_chain_origin+0x50/0x90 [ 1504.871785][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1504.876387][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1504.881332][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1504.886214][T29630] do_syscall_64+0xb0/0x150 [ 1504.890731][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1504.896622][T29630] [ 1504.898949][T29630] Uninit was stored to memory at: [ 1504.903986][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1504.909720][T29630] __msan_chain_origin+0x50/0x90 [ 1504.914669][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1504.919275][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1504.924222][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1504.929084][T29630] do_syscall_64+0xb0/0x150 [ 1504.933601][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1504.939488][T29630] [ 1504.941817][T29630] Uninit was stored to memory at: [ 1504.946858][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1504.952591][T29630] __msan_chain_origin+0x50/0x90 [ 1504.957540][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1504.962141][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1504.967092][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1504.971958][T29630] do_syscall_64+0xb0/0x150 [ 1504.976584][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1504.982477][T29630] [ 1504.984809][T29630] Uninit was stored to memory at: [ 1504.989851][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1504.995590][T29630] __msan_chain_origin+0x50/0x90 [ 1505.000545][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1505.005150][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1505.010109][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1505.014978][T29630] do_syscall_64+0xb0/0x150 [ 1505.019505][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1505.025393][T29630] [ 1505.027720][T29630] Uninit was stored to memory at: [ 1505.032757][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1505.038487][T29630] __msan_chain_origin+0x50/0x90 [ 1505.043435][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1505.048035][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1505.052984][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1505.057846][T29630] do_syscall_64+0xb0/0x150 [ 1505.062362][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1505.068247][T29630] [ 1505.070573][T29630] Uninit was stored to memory at: [ 1505.075609][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1505.081341][T29630] __msan_chain_origin+0x50/0x90 [ 1505.086289][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1505.090888][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1505.095833][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1505.100700][T29630] do_syscall_64+0xb0/0x150 [ 1505.105240][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1505.111124][T29630] [ 1505.113459][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1505.120140][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1505.124564][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1505.528486][T29630] not chained 760000 origins [ 1505.533162][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1505.541841][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1505.551896][T29630] Call Trace: [ 1505.555212][T29630] dump_stack+0x1df/0x240 [ 1505.559566][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1505.565300][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1505.570427][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1505.576335][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1505.581639][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1505.586852][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1505.592671][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1505.598750][T29630] ? kfree+0x61/0x30f0 [ 1505.602837][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1505.607965][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1505.613525][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1505.619614][T29630] ? _copy_from_user+0x15b/0x260 [ 1505.624561][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1505.629684][T29630] __msan_chain_origin+0x50/0x90 [ 1505.634642][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1505.639310][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1505.644614][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1505.649650][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1505.654683][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1505.660593][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1505.665558][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1505.670426][T29630] do_syscall_64+0xb0/0x150 [ 1505.674945][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1505.680840][T29630] RIP: 0033:0x45c1d9 [ 1505.684728][T29630] Code: Bad RIP value. [ 1505.688796][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1505.697227][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1505.705217][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1505.713202][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1505.721181][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1505.729164][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1505.737166][T29630] Uninit was stored to memory at: [ 1505.742217][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1505.747943][T29630] __msan_chain_origin+0x50/0x90 [ 1505.752920][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1505.757539][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1505.762482][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1505.767341][T29630] do_syscall_64+0xb0/0x150 [ 1505.771854][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1505.777739][T29630] [ 1505.780064][T29630] Uninit was stored to memory at: [ 1505.785099][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1505.790823][T29630] __msan_chain_origin+0x50/0x90 [ 1505.795768][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1505.800364][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1505.805310][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1505.810177][T29630] do_syscall_64+0xb0/0x150 [ 1505.814700][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1505.820584][T29630] [ 1505.822912][T29630] Uninit was stored to memory at: [ 1505.827950][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1505.833677][T29630] __msan_chain_origin+0x50/0x90 [ 1505.838625][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1505.843236][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1505.848180][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1505.853050][T29630] do_syscall_64+0xb0/0x150 [ 1505.857567][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1505.863454][T29630] [ 1505.865804][T29630] Uninit was stored to memory at: [ 1505.870840][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1505.876569][T29630] __msan_chain_origin+0x50/0x90 [ 1505.881524][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1505.886140][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1505.891088][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1505.895947][T29630] do_syscall_64+0xb0/0x150 [ 1505.900463][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1505.906351][T29630] [ 1505.908686][T29630] Uninit was stored to memory at: [ 1505.913729][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1505.919469][T29630] __msan_chain_origin+0x50/0x90 [ 1505.924421][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1505.929066][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1505.934046][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1505.938911][T29630] do_syscall_64+0xb0/0x150 [ 1505.943429][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1505.949339][T29630] [ 1505.951666][T29630] Uninit was stored to memory at: [ 1505.956707][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1505.962445][T29630] __msan_chain_origin+0x50/0x90 [ 1505.967394][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1505.971998][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1505.976948][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1505.981812][T29630] do_syscall_64+0xb0/0x150 [ 1505.986351][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1505.992239][T29630] [ 1505.994569][T29630] Uninit was stored to memory at: [ 1505.999609][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1506.005347][T29630] __msan_chain_origin+0x50/0x90 [ 1506.010302][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1506.014906][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1506.019861][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1506.024751][T29630] do_syscall_64+0xb0/0x150 [ 1506.029308][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1506.035207][T29630] [ 1506.037539][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1506.044223][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1506.048648][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1506.246247][T29630] not chained 770000 origins [ 1506.250907][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1506.259578][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.269633][T29630] Call Trace: [ 1506.272943][T29630] dump_stack+0x1df/0x240 [ 1506.277295][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1506.283037][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1506.288163][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1506.294074][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1506.299380][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1506.304591][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1506.310414][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1506.316499][T29630] ? kfree+0x61/0x30f0 [ 1506.320587][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1506.325713][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1506.331280][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1506.337377][T29630] ? _copy_from_user+0x15b/0x260 [ 1506.342337][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1506.347465][T29630] __msan_chain_origin+0x50/0x90 [ 1506.352426][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1506.357087][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1506.362396][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1506.367432][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1506.372473][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1506.378382][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1506.383365][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1506.388233][T29630] do_syscall_64+0xb0/0x150 [ 1506.392759][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1506.398665][T29630] RIP: 0033:0x45c1d9 [ 1506.402556][T29630] Code: Bad RIP value. [ 1506.406625][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1506.415046][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1506.423051][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1506.431033][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1506.439020][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1506.447004][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1506.454998][T29630] Uninit was stored to memory at: [ 1506.460048][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1506.465780][T29630] __msan_chain_origin+0x50/0x90 [ 1506.470736][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1506.475340][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1506.480285][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1506.485151][T29630] do_syscall_64+0xb0/0x150 [ 1506.489666][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1506.495549][T29630] [ 1506.497877][T29630] Uninit was stored to memory at: [ 1506.502914][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1506.508639][T29630] __msan_chain_origin+0x50/0x90 [ 1506.513583][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1506.518179][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1506.523125][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1506.527983][T29630] do_syscall_64+0xb0/0x150 [ 1506.532497][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1506.538387][T29630] [ 1506.540712][T29630] Uninit was stored to memory at: [ 1506.545743][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1506.551468][T29630] __msan_chain_origin+0x50/0x90 [ 1506.556415][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1506.561017][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1506.565966][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1506.570827][T29630] do_syscall_64+0xb0/0x150 [ 1506.575342][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1506.581279][T29630] [ 1506.583621][T29630] Uninit was stored to memory at: [ 1506.588661][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1506.594392][T29630] __msan_chain_origin+0x50/0x90 [ 1506.599346][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1506.603955][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1506.608931][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1506.613793][T29630] do_syscall_64+0xb0/0x150 [ 1506.618314][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1506.624207][T29630] [ 1506.626535][T29630] Uninit was stored to memory at: [ 1506.631576][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1506.637302][T29630] __msan_chain_origin+0x50/0x90 [ 1506.642250][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1506.646852][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1506.651797][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1506.656661][T29630] do_syscall_64+0xb0/0x150 [ 1506.661173][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1506.667068][T29630] [ 1506.669392][T29630] Uninit was stored to memory at: [ 1506.674426][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1506.680150][T29630] __msan_chain_origin+0x50/0x90 [ 1506.685104][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1506.689723][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1506.694668][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1506.699530][T29630] do_syscall_64+0xb0/0x150 [ 1506.704047][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1506.709937][T29630] [ 1506.712262][T29630] Uninit was stored to memory at: [ 1506.717294][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1506.723021][T29630] __msan_chain_origin+0x50/0x90 [ 1506.727972][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1506.732569][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1506.737514][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1506.742373][T29630] do_syscall_64+0xb0/0x150 [ 1506.746889][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1506.752793][T29630] [ 1506.755121][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1506.761803][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1506.766233][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1507.189357][T29630] not chained 780000 origins [ 1507.194023][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1507.202698][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.212767][T29630] Call Trace: [ 1507.216082][T29630] dump_stack+0x1df/0x240 [ 1507.220435][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1507.226175][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1507.231309][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1507.237234][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1507.242545][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1507.247764][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1507.253588][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1507.259677][T29630] ? kfree+0x61/0x30f0 [ 1507.263789][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1507.268919][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1507.274518][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1507.280615][T29630] ? _copy_from_user+0x15b/0x260 [ 1507.285595][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1507.290726][T29630] __msan_chain_origin+0x50/0x90 [ 1507.295688][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1507.300362][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1507.305676][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1507.310712][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1507.315753][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1507.321666][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1507.326641][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1507.331508][T29630] do_syscall_64+0xb0/0x150 [ 1507.336044][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1507.341946][T29630] RIP: 0033:0x45c1d9 [ 1507.345840][T29630] Code: Bad RIP value. [ 1507.349908][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1507.358331][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1507.366315][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1507.374295][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1507.382285][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1507.390269][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1507.398299][T29630] Uninit was stored to memory at: [ 1507.403361][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1507.409091][T29630] __msan_chain_origin+0x50/0x90 [ 1507.414065][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1507.418668][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1507.423624][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1507.428487][T29630] do_syscall_64+0xb0/0x150 [ 1507.433009][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1507.438906][T29630] [ 1507.441322][T29630] Uninit was stored to memory at: [ 1507.446371][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1507.452125][T29630] __msan_chain_origin+0x50/0x90 [ 1507.457078][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1507.461674][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1507.466621][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1507.471481][T29630] do_syscall_64+0xb0/0x150 [ 1507.475993][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1507.481875][T29630] [ 1507.484206][T29630] Uninit was stored to memory at: [ 1507.489268][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1507.494996][T29630] __msan_chain_origin+0x50/0x90 [ 1507.499944][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1507.504542][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1507.509513][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1507.514548][T29630] do_syscall_64+0xb0/0x150 [ 1507.519064][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1507.524951][T29630] [ 1507.527288][T29630] Uninit was stored to memory at: [ 1507.532322][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1507.538048][T29630] __msan_chain_origin+0x50/0x90 [ 1507.542998][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1507.547595][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1507.552542][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1507.557430][T29630] do_syscall_64+0xb0/0x150 [ 1507.561945][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1507.567836][T29630] [ 1507.570164][T29630] Uninit was stored to memory at: [ 1507.575221][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1507.580971][T29630] __msan_chain_origin+0x50/0x90 [ 1507.585918][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1507.590519][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1507.595466][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1507.600326][T29630] do_syscall_64+0xb0/0x150 [ 1507.604840][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1507.610724][T29630] [ 1507.613053][T29630] Uninit was stored to memory at: [ 1507.618089][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1507.623815][T29630] __msan_chain_origin+0x50/0x90 [ 1507.628766][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1507.633364][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1507.638322][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1507.643184][T29630] do_syscall_64+0xb0/0x150 [ 1507.647701][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1507.653587][T29630] [ 1507.655915][T29630] Uninit was stored to memory at: [ 1507.660949][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1507.666675][T29630] __msan_chain_origin+0x50/0x90 [ 1507.671619][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1507.676219][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1507.681166][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1507.686027][T29630] do_syscall_64+0xb0/0x150 [ 1507.690565][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1507.696448][T29630] [ 1507.698806][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1507.705494][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1507.709918][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1508.200675][T29630] not chained 790000 origins [ 1508.205323][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1508.213997][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1508.224064][T29630] Call Trace: [ 1508.227381][T29630] dump_stack+0x1df/0x240 [ 1508.231735][T29630] ? psi_group_change+0x1007/0x13c0 [ 1508.236956][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1508.242706][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1508.247923][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1508.253482][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1508.258695][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1508.263907][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1508.269472][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1508.274684][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1508.279812][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1508.285378][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1508.291480][T29630] ? _copy_from_user+0x15b/0x260 [ 1508.296439][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1508.301568][T29630] __msan_chain_origin+0x50/0x90 [ 1508.306533][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1508.311208][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1508.316516][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1508.321561][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1508.326598][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1508.332513][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1508.337488][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1508.342358][T29630] do_syscall_64+0xb0/0x150 [ 1508.346891][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1508.352800][T29630] RIP: 0033:0x45c1d9 [ 1508.356716][T29630] Code: Bad RIP value. [ 1508.360785][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1508.369203][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1508.377182][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1508.385160][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1508.393143][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1508.401127][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1508.409124][T29630] Uninit was stored to memory at: [ 1508.414168][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1508.419895][T29630] __msan_chain_origin+0x50/0x90 [ 1508.424854][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1508.429456][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1508.434403][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1508.439268][T29630] do_syscall_64+0xb0/0x150 [ 1508.443782][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1508.449677][T29630] [ 1508.452007][T29630] Uninit was stored to memory at: [ 1508.457049][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1508.462782][T29630] __msan_chain_origin+0x50/0x90 [ 1508.467727][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1508.472325][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1508.477271][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1508.482133][T29630] do_syscall_64+0xb0/0x150 [ 1508.486646][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1508.492537][T29630] [ 1508.494862][T29630] Uninit was stored to memory at: [ 1508.499898][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1508.505621][T29630] __msan_chain_origin+0x50/0x90 [ 1508.510568][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1508.515165][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1508.520117][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1508.525002][T29630] do_syscall_64+0xb0/0x150 [ 1508.529514][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1508.535399][T29630] [ 1508.537723][T29630] Uninit was stored to memory at: [ 1508.542757][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1508.549007][T29630] __msan_chain_origin+0x50/0x90 [ 1508.553957][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1508.558581][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1508.563534][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1508.568396][T29630] do_syscall_64+0xb0/0x150 [ 1508.572911][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1508.578796][T29630] [ 1508.581124][T29630] Uninit was stored to memory at: [ 1508.586162][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1508.591890][T29630] __msan_chain_origin+0x50/0x90 [ 1508.596839][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1508.601448][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1508.606411][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1508.611276][T29630] do_syscall_64+0xb0/0x150 [ 1508.615798][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1508.621695][T29630] [ 1508.624028][T29630] Uninit was stored to memory at: [ 1508.629071][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1508.634800][T29630] __msan_chain_origin+0x50/0x90 [ 1508.639751][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1508.644354][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1508.649304][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1508.654168][T29630] do_syscall_64+0xb0/0x150 [ 1508.658691][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1508.664578][T29630] [ 1508.666908][T29630] Uninit was stored to memory at: [ 1508.671967][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1508.677714][T29630] __msan_chain_origin+0x50/0x90 [ 1508.682664][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1508.687268][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1508.692221][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1508.697082][T29630] do_syscall_64+0xb0/0x150 [ 1508.701598][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1508.707482][T29630] [ 1508.709812][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1508.716494][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1508.720919][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1509.111987][T29630] not chained 800000 origins [ 1509.116637][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1509.125314][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1509.135382][T29630] Call Trace: [ 1509.138698][T29630] dump_stack+0x1df/0x240 [ 1509.143057][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1509.148796][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1509.153927][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1509.159843][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1509.165155][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1509.170385][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1509.176218][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1509.182305][T29630] ? kfree+0x61/0x30f0 [ 1509.186432][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1509.191560][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1509.197148][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1509.203294][T29630] ? _copy_from_user+0x15b/0x260 [ 1509.208251][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1509.213377][T29630] __msan_chain_origin+0x50/0x90 [ 1509.218341][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1509.223012][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1509.228319][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1509.233352][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1509.238391][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1509.244307][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1509.249275][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1509.254146][T29630] do_syscall_64+0xb0/0x150 [ 1509.258669][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1509.264570][T29630] RIP: 0033:0x45c1d9 [ 1509.268462][T29630] Code: Bad RIP value. [ 1509.272550][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1509.280976][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1509.288966][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1509.296944][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1509.304931][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1509.312908][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1509.320905][T29630] Uninit was stored to memory at: [ 1509.325957][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1509.331684][T29630] __msan_chain_origin+0x50/0x90 [ 1509.336633][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1509.341230][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1509.346177][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1509.351049][T29630] do_syscall_64+0xb0/0x150 [ 1509.355563][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1509.361453][T29630] [ 1509.363779][T29630] Uninit was stored to memory at: [ 1509.368826][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1509.374568][T29630] __msan_chain_origin+0x50/0x90 [ 1509.379515][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1509.384115][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1509.389061][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1509.393921][T29630] do_syscall_64+0xb0/0x150 [ 1509.398438][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1509.404323][T29630] [ 1509.406652][T29630] Uninit was stored to memory at: [ 1509.411686][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1509.417410][T29630] __msan_chain_origin+0x50/0x90 [ 1509.422360][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1509.426976][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1509.431922][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1509.436811][T29630] do_syscall_64+0xb0/0x150 [ 1509.441327][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1509.447298][T29630] [ 1509.449631][T29630] Uninit was stored to memory at: [ 1509.454684][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1509.460444][T29630] __msan_chain_origin+0x50/0x90 [ 1509.465408][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1509.470016][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1509.474973][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1509.479844][T29630] do_syscall_64+0xb0/0x150 [ 1509.484368][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1509.490358][T29630] [ 1509.492698][T29630] Uninit was stored to memory at: [ 1509.497796][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1509.503539][T29630] __msan_chain_origin+0x50/0x90 [ 1509.508504][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1509.513125][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1509.518089][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1509.522978][T29630] do_syscall_64+0xb0/0x150 [ 1509.527503][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1509.533433][T29630] [ 1509.535767][T29630] Uninit was stored to memory at: [ 1509.540811][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1509.546573][T29630] __msan_chain_origin+0x50/0x90 [ 1509.551524][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1509.556126][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1509.561076][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1509.565936][T29630] do_syscall_64+0xb0/0x150 [ 1509.570453][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1509.576338][T29630] [ 1509.578754][T29630] Uninit was stored to memory at: [ 1509.583793][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1509.589520][T29630] __msan_chain_origin+0x50/0x90 [ 1509.594506][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1509.599112][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1509.604072][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1509.608932][T29630] do_syscall_64+0xb0/0x150 [ 1509.613451][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1509.619337][T29630] [ 1509.621666][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1509.628380][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1509.632809][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1509.993788][T29630] not chained 810000 origins [ 1509.998437][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1510.007107][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1510.017197][T29630] Call Trace: [ 1510.020542][T29630] dump_stack+0x1df/0x240 [ 1510.024909][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1510.030644][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1510.035779][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1510.041695][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1510.047014][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1510.052231][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1510.058056][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1510.064140][T29630] ? kfree+0x61/0x30f0 [ 1510.068227][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1510.073353][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1510.078939][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1510.085033][T29630] ? _copy_from_user+0x15b/0x260 [ 1510.089990][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1510.095132][T29630] __msan_chain_origin+0x50/0x90 [ 1510.100098][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1510.104779][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1510.110091][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1510.115131][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1510.120187][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1510.126099][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1510.131070][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1510.135941][T29630] do_syscall_64+0xb0/0x150 [ 1510.140467][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1510.146367][T29630] RIP: 0033:0x45c1d9 [ 1510.150261][T29630] Code: Bad RIP value. [ 1510.154333][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1510.162767][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1510.170763][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1510.178783][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1510.186774][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1510.194824][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1510.202827][T29630] Uninit was stored to memory at: [ 1510.207877][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1510.213622][T29630] __msan_chain_origin+0x50/0x90 [ 1510.218612][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1510.223215][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1510.228163][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1510.233037][T29630] do_syscall_64+0xb0/0x150 [ 1510.237549][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1510.243435][T29630] [ 1510.245767][T29630] Uninit was stored to memory at: [ 1510.250808][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1510.256534][T29630] __msan_chain_origin+0x50/0x90 [ 1510.261482][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1510.266081][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1510.271030][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1510.275891][T29630] do_syscall_64+0xb0/0x150 [ 1510.280404][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1510.286288][T29630] [ 1510.288613][T29630] Uninit was stored to memory at: [ 1510.293647][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1510.299374][T29630] __msan_chain_origin+0x50/0x90 [ 1510.304327][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1510.308929][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1510.313880][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1510.318741][T29630] do_syscall_64+0xb0/0x150 [ 1510.323259][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1510.329144][T29630] [ 1510.331470][T29630] Uninit was stored to memory at: [ 1510.336503][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1510.342230][T29630] __msan_chain_origin+0x50/0x90 [ 1510.347180][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1510.351785][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1510.356736][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1510.361604][T29630] do_syscall_64+0xb0/0x150 [ 1510.366117][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1510.372004][T29630] [ 1510.374329][T29630] Uninit was stored to memory at: [ 1510.379367][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1510.385093][T29630] __msan_chain_origin+0x50/0x90 [ 1510.390056][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1510.394655][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1510.399601][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1510.404462][T29630] do_syscall_64+0xb0/0x150 [ 1510.408974][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1510.414865][T29630] [ 1510.417255][T29630] Uninit was stored to memory at: [ 1510.422291][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1510.428019][T29630] __msan_chain_origin+0x50/0x90 [ 1510.432971][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1510.437574][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1510.442525][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1510.447396][T29630] do_syscall_64+0xb0/0x150 [ 1510.451910][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1510.457802][T29630] [ 1510.460139][T29630] Uninit was stored to memory at: [ 1510.465180][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1510.470907][T29630] __msan_chain_origin+0x50/0x90 [ 1510.475858][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1510.480458][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1510.485409][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1510.490273][T29630] do_syscall_64+0xb0/0x150 [ 1510.494792][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1510.500680][T29630] [ 1510.503012][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1510.509707][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1510.514145][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1510.805674][T29630] not chained 820000 origins [ 1510.810328][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1510.819010][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1510.829100][T29630] Call Trace: [ 1510.832420][T29630] dump_stack+0x1df/0x240 [ 1510.836785][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1510.842528][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1510.847667][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1510.853586][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1510.858894][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1510.864112][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1510.869941][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1510.876031][T29630] ? kfree+0x61/0x30f0 [ 1510.880141][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1510.885276][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1510.890849][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1510.896951][T29630] ? _copy_from_user+0x15b/0x260 [ 1510.901914][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1510.907050][T29630] __msan_chain_origin+0x50/0x90 [ 1510.912046][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1510.916718][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1510.922028][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1510.927071][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1510.932109][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1510.938035][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1510.943007][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1510.947880][T29630] do_syscall_64+0xb0/0x150 [ 1510.952412][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1510.958317][T29630] RIP: 0033:0x45c1d9 [ 1510.962208][T29630] Code: Bad RIP value. [ 1510.966275][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1510.974703][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1510.982690][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1510.990680][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1510.998703][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1511.006695][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1511.014697][T29630] Uninit was stored to memory at: [ 1511.019738][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.025469][T29630] __msan_chain_origin+0x50/0x90 [ 1511.030418][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.035020][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.039967][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.044828][T29630] do_syscall_64+0xb0/0x150 [ 1511.049344][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.055242][T29630] [ 1511.057568][T29630] Uninit was stored to memory at: [ 1511.062615][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.068381][T29630] __msan_chain_origin+0x50/0x90 [ 1511.073334][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.077945][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.082891][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.087751][T29630] do_syscall_64+0xb0/0x150 [ 1511.092267][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.098160][T29630] [ 1511.100493][T29630] Uninit was stored to memory at: [ 1511.105533][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.111270][T29630] __msan_chain_origin+0x50/0x90 [ 1511.116229][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.120829][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.125777][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.130645][T29630] do_syscall_64+0xb0/0x150 [ 1511.135161][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.141052][T29630] [ 1511.143383][T29630] Uninit was stored to memory at: [ 1511.148419][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.154145][T29630] __msan_chain_origin+0x50/0x90 [ 1511.159093][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.163689][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.168636][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.173495][T29630] do_syscall_64+0xb0/0x150 [ 1511.178034][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.183920][T29630] [ 1511.186244][T29630] Uninit was stored to memory at: [ 1511.191279][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.197006][T29630] __msan_chain_origin+0x50/0x90 [ 1511.201985][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.206584][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.211532][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.216417][T29630] do_syscall_64+0xb0/0x150 [ 1511.220932][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.226824][T29630] [ 1511.229153][T29630] Uninit was stored to memory at: [ 1511.234196][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.239933][T29630] __msan_chain_origin+0x50/0x90 [ 1511.244890][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.249509][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.254460][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.259326][T29630] do_syscall_64+0xb0/0x150 [ 1511.263838][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.269727][T29630] [ 1511.272057][T29630] Uninit was stored to memory at: [ 1511.277101][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.282832][T29630] __msan_chain_origin+0x50/0x90 [ 1511.287782][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.292387][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.297334][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.302207][T29630] do_syscall_64+0xb0/0x150 [ 1511.306718][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.312603][T29630] [ 1511.314933][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1511.321618][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1511.326039][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1511.555411][T29630] not chained 830000 origins [ 1511.560061][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1511.568735][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1511.578804][T29630] Call Trace: [ 1511.582127][T29630] dump_stack+0x1df/0x240 [ 1511.586487][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1511.592262][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1511.597399][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1511.603318][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1511.608622][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1511.613844][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1511.619668][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1511.625759][T29630] ? kfree+0x61/0x30f0 [ 1511.629867][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1511.634994][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1511.640580][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1511.646679][T29630] ? _copy_from_user+0x15b/0x260 [ 1511.651637][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1511.656764][T29630] __msan_chain_origin+0x50/0x90 [ 1511.661729][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.666399][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1511.671716][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1511.676756][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1511.681823][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1511.687746][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.692734][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.697608][T29630] do_syscall_64+0xb0/0x150 [ 1511.702174][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.708094][T29630] RIP: 0033:0x45c1d9 [ 1511.711985][T29630] Code: Bad RIP value. [ 1511.716057][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1511.724482][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1511.732463][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1511.740456][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1511.748457][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1511.756442][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1511.764467][T29630] Uninit was stored to memory at: [ 1511.769519][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.775266][T29630] __msan_chain_origin+0x50/0x90 [ 1511.780220][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.784823][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.789775][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.794637][T29630] do_syscall_64+0xb0/0x150 [ 1511.799156][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.805040][T29630] [ 1511.807372][T29630] Uninit was stored to memory at: [ 1511.812414][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.818144][T29630] __msan_chain_origin+0x50/0x90 [ 1511.823094][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.827698][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.832641][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.837504][T29630] do_syscall_64+0xb0/0x150 [ 1511.842021][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.847909][T29630] [ 1511.850235][T29630] Uninit was stored to memory at: [ 1511.855272][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.861001][T29630] __msan_chain_origin+0x50/0x90 [ 1511.865950][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.870545][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.875493][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.880354][T29630] do_syscall_64+0xb0/0x150 [ 1511.884866][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.890749][T29630] [ 1511.893076][T29630] Uninit was stored to memory at: [ 1511.898108][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.903834][T29630] __msan_chain_origin+0x50/0x90 [ 1511.908778][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.913381][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.918332][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.923194][T29630] do_syscall_64+0xb0/0x150 [ 1511.927717][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.933603][T29630] [ 1511.935934][T29630] Uninit was stored to memory at: [ 1511.940974][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.946704][T29630] __msan_chain_origin+0x50/0x90 [ 1511.951649][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.956248][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1511.961194][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1511.966057][T29630] do_syscall_64+0xb0/0x150 [ 1511.970570][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1511.976452][T29630] [ 1511.978777][T29630] Uninit was stored to memory at: [ 1511.983811][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1511.989536][T29630] __msan_chain_origin+0x50/0x90 [ 1511.994483][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1511.999082][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1512.004026][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1512.008884][T29630] do_syscall_64+0xb0/0x150 [ 1512.013404][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1512.019299][T29630] [ 1512.021630][T29630] Uninit was stored to memory at: [ 1512.026681][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1512.032418][T29630] __msan_chain_origin+0x50/0x90 [ 1512.037368][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1512.041967][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1512.046915][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1512.051797][T29630] do_syscall_64+0xb0/0x150 [ 1512.056338][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1512.062224][T29630] [ 1512.064562][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1512.071252][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1512.075678][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1512.388238][T29630] not chained 840000 origins [ 1512.392884][T29630] CPU: 0 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1512.401560][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1512.411633][T29630] Call Trace: [ 1512.414976][T29630] dump_stack+0x1df/0x240 [ 1512.419333][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1512.425068][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1512.430194][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1512.436113][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1512.441416][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1512.446691][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1512.452526][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1512.458615][T29630] ? kfree+0x61/0x30f0 [ 1512.462714][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1512.467847][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1512.473421][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1512.479512][T29630] ? _copy_from_user+0x15b/0x260 [ 1512.484468][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1512.489596][T29630] __msan_chain_origin+0x50/0x90 [ 1512.494561][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1512.499236][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1512.504546][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1512.509583][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1512.514626][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1512.520576][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1512.525552][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1512.530452][T29630] do_syscall_64+0xb0/0x150 [ 1512.534991][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1512.540894][T29630] RIP: 0033:0x45c1d9 [ 1512.544786][T29630] Code: Bad RIP value. [ 1512.548854][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1512.557313][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1512.565312][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1512.573333][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1512.581325][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1512.589441][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1512.597452][T29630] Uninit was stored to memory at: [ 1512.602503][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1512.608237][T29630] __msan_chain_origin+0x50/0x90 [ 1512.613191][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1512.617798][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1512.622793][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1512.627669][T29630] do_syscall_64+0xb0/0x150 [ 1512.632210][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1512.638113][T29630] [ 1512.640449][T29630] Uninit was stored to memory at: [ 1512.645503][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1512.651250][T29630] __msan_chain_origin+0x50/0x90 [ 1512.656218][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1512.660853][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1512.665813][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1512.670687][T29630] do_syscall_64+0xb0/0x150 [ 1512.675247][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1512.681150][T29630] [ 1512.683496][T29630] Uninit was stored to memory at: [ 1512.688541][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1512.694288][T29630] __msan_chain_origin+0x50/0x90 [ 1512.699251][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1512.703858][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1512.708808][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1512.713679][T29630] do_syscall_64+0xb0/0x150 [ 1512.718208][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1512.724095][T29630] [ 1512.726422][T29630] Uninit was stored to memory at: [ 1512.731466][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1512.737204][T29630] __msan_chain_origin+0x50/0x90 [ 1512.742157][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1512.746765][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1512.751716][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1512.756589][T29630] do_syscall_64+0xb0/0x150 [ 1512.761102][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1512.766987][T29630] [ 1512.769329][T29630] Uninit was stored to memory at: [ 1512.774364][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1512.780095][T29630] __msan_chain_origin+0x50/0x90 [ 1512.785046][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1512.789680][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1512.794638][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1512.799607][T29630] do_syscall_64+0xb0/0x150 [ 1512.804129][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1512.810045][T29630] [ 1512.812374][T29630] Uninit was stored to memory at: [ 1512.817419][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1512.823154][T29630] __msan_chain_origin+0x50/0x90 [ 1512.828118][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1512.832718][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1512.837672][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1512.842537][T29630] do_syscall_64+0xb0/0x150 [ 1512.847056][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1512.852974][T29630] [ 1512.855300][T29630] Uninit was stored to memory at: [ 1512.860345][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1512.866080][T29630] __msan_chain_origin+0x50/0x90 [ 1512.871060][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1512.875671][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1512.880622][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1512.885486][T29630] do_syscall_64+0xb0/0x150 [ 1512.890007][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1512.895918][T29630] [ 1512.898248][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1512.904937][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1512.909361][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1513.210474][T29630] not chained 850000 origins [ 1513.215120][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1513.223791][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1513.233867][T29630] Call Trace: [ 1513.237195][T29630] dump_stack+0x1df/0x240 [ 1513.241573][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1513.247305][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1513.252431][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1513.258454][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1513.263766][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1513.268984][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1513.274807][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1513.280887][T29630] ? kfree+0x61/0x30f0 [ 1513.284977][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1513.290102][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1513.295689][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1513.301781][T29630] ? _copy_from_user+0x15b/0x260 [ 1513.306727][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1513.311859][T29630] __msan_chain_origin+0x50/0x90 [ 1513.316815][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1513.321472][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1513.326782][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1513.331827][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1513.336863][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1513.342782][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1513.347756][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1513.352626][T29630] do_syscall_64+0xb0/0x150 [ 1513.357151][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1513.363051][T29630] RIP: 0033:0x45c1d9 [ 1513.366954][T29630] Code: Bad RIP value. [ 1513.371024][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1513.379446][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1513.387452][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1513.395433][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1513.403414][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1513.411392][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1513.419392][T29630] Uninit was stored to memory at: [ 1513.424439][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1513.430172][T29630] __msan_chain_origin+0x50/0x90 [ 1513.435123][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1513.439734][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1513.444698][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1513.449567][T29630] do_syscall_64+0xb0/0x150 [ 1513.454084][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1513.459971][T29630] [ 1513.462296][T29630] Uninit was stored to memory at: [ 1513.467349][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1513.473077][T29630] __msan_chain_origin+0x50/0x90 [ 1513.478032][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1513.482631][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1513.487607][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1513.492471][T29630] do_syscall_64+0xb0/0x150 [ 1513.496981][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1513.502868][T29630] [ 1513.505201][T29630] Uninit was stored to memory at: [ 1513.510246][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1513.515974][T29630] __msan_chain_origin+0x50/0x90 [ 1513.520925][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1513.525526][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1513.530473][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1513.535344][T29630] do_syscall_64+0xb0/0x150 [ 1513.539867][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1513.545761][T29630] [ 1513.548094][T29630] Uninit was stored to memory at: [ 1513.553133][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1513.558862][T29630] __msan_chain_origin+0x50/0x90 [ 1513.563844][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1513.568446][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1513.573396][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1513.578267][T29630] do_syscall_64+0xb0/0x150 [ 1513.582790][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1513.588700][T29630] [ 1513.591028][T29630] Uninit was stored to memory at: [ 1513.596063][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1513.601791][T29630] __msan_chain_origin+0x50/0x90 [ 1513.606740][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1513.611336][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1513.616281][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1513.621144][T29630] do_syscall_64+0xb0/0x150 [ 1513.625659][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1513.631545][T29630] [ 1513.633870][T29630] Uninit was stored to memory at: [ 1513.638905][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1513.644635][T29630] __msan_chain_origin+0x50/0x90 [ 1513.649582][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1513.654182][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1513.659127][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1513.663996][T29630] do_syscall_64+0xb0/0x150 [ 1513.668510][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1513.674395][T29630] [ 1513.676724][T29630] Uninit was stored to memory at: [ 1513.681761][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1513.687497][T29630] __msan_chain_origin+0x50/0x90 [ 1513.692452][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1513.697053][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1513.702003][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1513.706868][T29630] do_syscall_64+0xb0/0x150 [ 1513.711384][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1513.717272][T29630] [ 1513.719601][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1513.726323][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1513.730754][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1514.000857][T29630] not chained 860000 origins [ 1514.005536][T29630] CPU: 1 PID: 29630 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1514.014220][T29630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.024310][T29630] Call Trace: [ 1514.027629][T29630] dump_stack+0x1df/0x240 [ 1514.032006][T29630] kmsan_internal_chain_origin+0x6f/0x130 [ 1514.037747][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1514.042975][T29630] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 1514.048924][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1514.054242][T29630] ? kmsan_get_metadata+0x11d/0x180 [ 1514.059465][T29630] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1514.065301][T29630] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1514.071408][T29630] ? kfree+0x61/0x30f0 [ 1514.075499][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1514.080717][T29630] ? kmsan_set_origin_checked+0x95/0xf0 [ 1514.086299][T29630] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 1514.092397][T29630] ? _copy_from_user+0x15b/0x260 [ 1514.097358][T29630] ? kmsan_get_metadata+0x4f/0x180 [ 1514.102493][T29630] __msan_chain_origin+0x50/0x90 [ 1514.107467][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1514.112148][T29630] ? __msan_poison_alloca+0xf0/0x120 [ 1514.117479][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1514.122532][T29630] ? __se_sys_recvmmsg+0xac/0x350 [ 1514.127581][T29630] ? __prepare_exit_to_usermode+0x16c/0x4d0 [ 1514.133507][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1514.138491][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1514.143377][T29630] do_syscall_64+0xb0/0x150 [ 1514.147918][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1514.153828][T29630] RIP: 0033:0x45c1d9 [ 1514.157752][T29630] Code: Bad RIP value. [ 1514.161830][T29630] RSP: 002b:00007fd1caa49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1514.170263][T29630] RAX: ffffffffffffffda RBX: 0000000000025200 RCX: 000000000045c1d9 [ 1514.178290][T29630] RDX: 00000000006fdaec RSI: 00000000200004c0 RDI: 0000000000000003 [ 1514.186285][T29630] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1514.194281][T29630] R10: 0000000000000022 R11: 0000000000000246 R12: 000000000078bf0c [ 1514.202275][T29630] R13: 0000000000c9fb6f R14: 00007fd1caa4a9c0 R15: 000000000078bf0c [ 1514.210286][T29630] Uninit was stored to memory at: [ 1514.215348][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1514.221094][T29630] __msan_chain_origin+0x50/0x90 [ 1514.226095][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1514.230710][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1514.235676][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1514.240559][T29630] do_syscall_64+0xb0/0x150 [ 1514.245101][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1514.251058][T29630] [ 1514.253416][T29630] Uninit was stored to memory at: [ 1514.258482][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1514.264231][T29630] __msan_chain_origin+0x50/0x90 [ 1514.269227][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1514.273848][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1514.278820][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1514.283691][T29630] do_syscall_64+0xb0/0x150 [ 1514.288232][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1514.294124][T29630] [ 1514.296459][T29630] Uninit was stored to memory at: [ 1514.301506][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1514.307243][T29630] __msan_chain_origin+0x50/0x90 [ 1514.312207][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1514.316910][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1514.321870][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1514.326738][T29630] do_syscall_64+0xb0/0x150 [ 1514.331260][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1514.337156][T29630] [ 1514.339492][T29630] Uninit was stored to memory at: [ 1514.344535][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1514.350268][T29630] __msan_chain_origin+0x50/0x90 [ 1514.355228][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1514.359842][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1514.364795][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1514.369657][T29630] do_syscall_64+0xb0/0x150 [ 1514.374179][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1514.380067][T29630] [ 1514.382394][T29630] Uninit was stored to memory at: [ 1514.387442][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1514.393268][T29630] __msan_chain_origin+0x50/0x90 [ 1514.398246][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1514.402848][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1514.407800][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1514.412666][T29630] do_syscall_64+0xb0/0x150 [ 1514.417187][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1514.423077][T29630] [ 1514.425402][T29630] Uninit was stored to memory at: [ 1514.430451][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1514.436183][T29630] __msan_chain_origin+0x50/0x90 [ 1514.441137][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1514.445750][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1514.450719][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1514.455587][T29630] do_syscall_64+0xb0/0x150 [ 1514.460108][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1514.465998][T29630] [ 1514.468330][T29630] Uninit was stored to memory at: [ 1514.473374][T29630] kmsan_internal_chain_origin+0xad/0x130 [ 1514.479109][T29630] __msan_chain_origin+0x50/0x90 [ 1514.484066][T29630] do_recvmmsg+0x105a/0x1ee0 [ 1514.488670][T29630] __se_sys_recvmmsg+0x1d1/0x350 [ 1514.493624][T29630] __x64_sys_recvmmsg+0x62/0x80 [ 1514.498489][T29630] do_syscall_64+0xb0/0x150 [ 1514.503014][T29630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1514.508908][T29630] [ 1514.511246][T29630] Local variable ----msg_sys@do_recvmmsg created at: [ 1514.517944][T29630] do_recvmmsg+0xc5/0x1ee0 [ 1514.522424][T29630] do_recvmmsg+0xc5/0x1ee0 05:59:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008001, 0x0, 0x0) 05:59:33 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:33 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x4c81, &(0x7f0000000040)) 05:59:33 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:33 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r5 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r6}}}], 0x28}}], 0x2, 0x0) 05:59:33 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1514.849455][T29679] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1514.983783][T29679] device dummy0 entered promiscuous mode 05:59:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r5}}}], 0x28}}], 0x2, 0x0) 05:59:34 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:34 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) [ 1515.093332][T29679] device dummy0 left promiscuous mode 05:59:34 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x4c81, &(0x7f0000000040)) 05:59:34 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:35 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e00000000000020000100000a"], 0xb8}}, 0x0) 05:59:35 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) 05:59:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4c81, 0x0) 05:59:35 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100), 0x10) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:35 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:35 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r5}}}], 0x28}}], 0x2, 0x0) 05:59:35 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 1516.414449][T29718] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, 0x0, 0x0, 0x94100000}}], 0x1, 0x0, 0x0) [ 1516.547787][T29718] device dummy0 entered promiscuous mode 05:59:35 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) socket(0x10, 0x3, 0x0) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4c81, 0x0) [ 1516.669367][T29718] device dummy0 left promiscuous mode 05:59:36 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 05:59:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4c81, 0x0) 05:59:36 executing program 2: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)=""/212, 0xd4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000002100)=@newqdisc={0x168, 0x24, 0x0, 0x0, 0x0, {}, [@TCA_STAB={0x34, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, {0x12, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}, @qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x168}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x369}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x412}, {&(0x7f0000000000)=""/22, 0x18}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x94100000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 05:59:36 executing program 2: mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:36 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 05:59:37 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:37 executing program 2: mq_open(0x0, 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:37 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 05:59:37 executing program 0: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) socket(0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000000880), 0x1000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) 05:59:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r5}}}], 0x28}}], 0x2, 0x0) 05:59:37 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380), 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 1518.446988][T29769] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:37 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 05:59:37 executing program 2: mq_open(0x0, 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) [ 1518.644139][T29769] device dummy0 entered promiscuous mode [ 1518.750879][T29769] device dummy0 left promiscuous mode 05:59:38 executing program 0: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) socket(0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000000880), 0x1000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) 05:59:38 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 05:59:38 executing program 2: mq_open(0x0, 0x0, 0x4, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:38 executing program 2: mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x0, &(0x7f0000000140)={0x1f, 0x5, 0x8, 0x1}) 05:59:39 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:39 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={0x0, 0xb8}}, 0x0) 05:59:39 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) lseek(r2, 0x0, 0x1) 05:59:39 executing program 2: mq_open(&(0x7f0000000040)='/&$*{@/\x00', 0x0, 0x0, 0x0) 05:59:39 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r6}}}], 0x28}}], 0x2, 0x0) 05:59:39 executing program 5: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xfa0f, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, 0x0) [ 1520.125069][T29818] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1520.289354][T29818] device dummy0 entered promiscuous mode 05:59:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x4a, &(0x7f0000000300)="f7f249b9740c9e57f4f22a160500000032a5b60a00008024c30e478947d190ac00000000000000000000000000000000663697ba4ecb40a2f32e32a3b88aaf3c06f4970e85a63c9a4b0d"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:59:39 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r6}}}], 0x28}}], 0x2, 0x0) 05:59:39 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={0x0, 0xb8}}, 0x0) [ 1520.427289][T29818] device dummy0 left promiscuous mode 05:59:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) 05:59:40 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={0x0, 0xb8}}, 0x0) 05:59:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) 05:59:40 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:40 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[], 0xb8}}, 0x0) 05:59:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r3, 0x2f) tkill(r2, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:40 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r6}}}], 0x28}}], 0x2, 0x0) 05:59:41 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[], 0xb8}}, 0x0) [ 1521.717733][T29865] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1521.806976][T29865] device dummy0 entered promiscuous mode 05:59:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getrandom(&(0x7f0000000040)=""/27, 0x1b, 0x3) [ 1521.906249][T29865] device dummy0 left promiscuous mode 05:59:42 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000000c0)=0x1) r2 = socket$inet(0x2, 0x800, 0x5) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000840)={0x2c, @multicast1, 0x0, 0x4, 'sed\x00', 0x1, 0xde3, 0x52}, 0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) getrandom(&(0x7f0000000040)=""/27, 0x1b, 0x3) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') mknodat(r4, &(0x7f0000000080)='./file0\x00', 0xc000, 0x0) 05:59:42 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[], 0xb8}}, 0x0) 05:59:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r3, 0x2f) tkill(r2, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c000100000000001f00000007000000", @ANYRES32, @ANYBLOB="0a00ff080a0002"], 0x28}}, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) 05:59:42 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:42 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r5}}}], 0x28}}], 0x2, 0x0) [ 1523.775145][T29900] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1523.868074][T29900] device dummy0 entered promiscuous mode 05:59:43 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0xb8}}, 0x0) [ 1523.968214][T29900] device dummy0 left promiscuous mode 05:59:43 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0xb8}}, 0x0) 05:59:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r3, 0x2f) tkill(r2, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:44 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0xb8}}, 0x0) 05:59:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000300)='./file0\x00', 0x0, 0x5110, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) 05:59:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r5}}}], 0x28}}], 0x2, 0x0) 05:59:44 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:44 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f0000000800"], 0xb8}}, 0x0) [ 1525.429644][T29942] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r3, 0x2f) tkill(r2, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:44 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x40000900000c4) [ 1525.590090][T29942] device dummy0 entered promiscuous mode 05:59:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) r3 = dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0xc0189436, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r5}}}], 0x28}}], 0x2, 0x0) [ 1525.707685][T29942] device dummy0 left promiscuous mode 05:59:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000300)='./file0\x00', 0x0, 0x5110, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) 05:59:45 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f0000000800"], 0xb8}}, 0x0) 05:59:45 executing program 2: 05:59:45 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f0000000800"], 0xb8}}, 0x0) 05:59:45 executing program 0: 05:59:45 executing program 2: 05:59:45 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f00000008000000050000000100000000009433"], 0xb8}}, 0x0) 05:59:46 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r3, 0x2f) tkill(r2, 0x2f) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:46 executing program 2: 05:59:46 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$tipc(0x1e, 0x4, 0x0) dup2(r1, r2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r3, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r5}}}], 0x28}}], 0x2, 0x0) [ 1527.106815][T29985] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:46 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f00000008000000050000000100000000009433"], 0xb8}}, 0x0) [ 1527.153476][T29985] device dummy0 entered promiscuous mode [ 1527.210748][T29985] device dummy0 left promiscuous mode 05:59:46 executing program 0: 05:59:46 executing program 2: 05:59:46 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f00000008000000050000000100000000009433"], 0xb8}}, 0x0) 05:59:47 executing program 0: 05:59:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r3, 0x2f) tkill(r2, 0x2f) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:47 executing program 2: 05:59:47 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e0000000000"], 0xb8}}, 0x0) 05:59:47 executing program 0: 05:59:47 executing program 2: 05:59:47 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e0000000000"], 0xb8}}, 0x0) 05:59:47 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:47 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$tipc(0x1e, 0x4, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r1, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r3}}}], 0x28}}], 0x2, 0x0) 05:59:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r3, 0x2f) tkill(r2, 0x2f) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) [ 1528.927028][T30023] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:48 executing program 0: 05:59:48 executing program 2: 05:59:48 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e0000000000"], 0xb8}}, 0x0) 05:59:48 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r1, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r3}}}], 0x28}}], 0x2, 0x0) [ 1529.044093][T30023] device dummy0 entered promiscuous mode [ 1529.163730][T30023] device dummy0 left promiscuous mode 05:59:48 executing program 2: 05:59:48 executing program 0: 05:59:48 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e000000000000200001"], 0xb8}}, 0x0) 05:59:49 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:49 executing program 2: 05:59:49 executing program 0: 05:59:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r3, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:49 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e000000000000200001"], 0xb8}}, 0x0) 05:59:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r1, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r3}}}], 0x28}}], 0x2, 0x0) 05:59:49 executing program 2: [ 1530.480988][T30060] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:49 executing program 0: 05:59:49 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e000000000000200001"], 0xb8}}, 0x0) [ 1530.613636][T30060] device dummy0 entered promiscuous mode [ 1530.735882][T30060] device dummy0 left promiscuous mode 05:59:50 executing program 2: 05:59:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r3, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:50 executing program 0: 05:59:51 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:51 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e0000000000002000010000"], 0xb8}}, 0x0) 05:59:51 executing program 2: 05:59:51 executing program 0: 05:59:51 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r1, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r3}}}], 0x28}}], 0x2, 0x0) 05:59:51 executing program 2: 05:59:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r3, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) [ 1532.041557][T30091] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:51 executing program 0: 05:59:51 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e0000000000002000010000"], 0xb8}}, 0x0) [ 1532.151633][T30091] device dummy0 entered promiscuous mode [ 1532.254817][T30091] device dummy0 left promiscuous mode [ 1532.265218][ C1] not chained 870000 origins [ 1532.269843][ C1] CPU: 1 PID: 24103 Comm: kworker/u4:13 Not tainted 5.8.0-rc5-syzkaller #0 [ 1532.278433][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1532.288516][ C1] Workqueue: krdsd rds_connect_worker [ 1532.293895][ C1] Call Trace: [ 1532.297225][ C1] [ 1532.300098][ C1] dump_stack+0x1df/0x240 [ 1532.304489][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 1532.310218][ C1] ? should_fail+0x72/0x9e0 [ 1532.314734][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.319961][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.325220][ C1] ? __should_failslab+0x1f6/0x290 [ 1532.330354][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 1532.335485][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1532.341306][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 1532.347466][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 1532.352794][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.357999][ C1] __msan_chain_origin+0x50/0x90 [ 1532.362950][ C1] tcp_conn_request+0x174b/0x4d10 [ 1532.368025][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.373226][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.378433][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1532.384252][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.389465][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1532.394594][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1532.399623][ C1] ? inet6_sk_rx_dst_set+0x400/0x400 [ 1532.404913][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1532.410290][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.415499][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1532.421309][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1532.427395][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.432630][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1532.437242][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1532.441747][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 1532.447874][ C1] ? tcp_filter+0xf0/0xf0 [ 1532.452204][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1532.457680][ C1] ip_local_deliver+0x62a/0x7c0 [ 1532.462551][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 1532.467573][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 1532.473213][ C1] ip_rcv+0x6cf/0x750 [ 1532.477558][ C1] ? ip_rcv_core+0x12c0/0x12c0 [ 1532.482325][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 1532.487962][ C1] process_backlog+0xfb5/0x14e0 [ 1532.492823][ C1] ? lapic_next_event+0x6e/0xa0 [ 1532.497705][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 1532.502994][ C1] net_rx_action+0x746/0x1aa0 [ 1532.507701][ C1] ? net_tx_action+0xc40/0xc40 [ 1532.512472][ C1] __do_softirq+0x311/0x83d [ 1532.517020][ C1] asm_call_on_stack+0x12/0x20 [ 1532.521799][ C1] [ 1532.524745][ C1] do_softirq_own_stack+0x7c/0xa0 [ 1532.529776][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 1532.535255][ C1] local_bh_enable+0x36/0x40 [ 1532.539847][ C1] ip_finish_output2+0x1fee/0x24a0 [ 1532.544971][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 1532.550987][ C1] __ip_finish_output+0xaa7/0xd80 [ 1532.556037][ C1] ip_finish_output+0x166/0x410 [ 1532.560936][ C1] ip_output+0x593/0x680 [ 1532.565227][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 1532.570518][ C1] ? ip_finish_output+0x410/0x410 [ 1532.575548][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 1532.580600][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 1532.586156][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.591391][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.596606][ C1] ip_queue_xmit+0xcc/0xf0 [ 1532.601033][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 1532.605886][ C1] __tcp_transmit_skb+0x440e/0x6090 [ 1532.611142][ C1] tcp_connect+0x4208/0x6830 [ 1532.615776][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 1532.621102][ C1] tcp_v4_connect+0x21fd/0x2370 [ 1532.625994][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 1532.630942][ C1] __inet_stream_connect+0x2fb/0x1340 [ 1532.636324][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 1532.641736][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.646979][ C1] inet_stream_connect+0x101/0x180 [ 1532.652108][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 1532.657748][ C1] rds_tcp_conn_path_connect+0x8a7/0xb70 [ 1532.663411][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 1532.668622][ C1] ? rds_tcp_state_change+0x390/0x390 [ 1532.674001][ C1] rds_connect_worker+0x2a6/0x470 [ 1532.679032][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1532.685111][ C1] ? rds_addr_cmp+0x200/0x200 [ 1532.689811][ C1] process_one_work+0x1540/0x1f30 [ 1532.694870][ C1] worker_thread+0xed2/0x23f0 [ 1532.699556][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1532.705388][ C1] kthread+0x515/0x550 [ 1532.709461][ C1] ? process_one_work+0x1f30/0x1f30 [ 1532.714668][ C1] ? kthread_blkcg+0xf0/0xf0 [ 1532.719268][ C1] ret_from_fork+0x22/0x30 [ 1532.723700][ C1] Uninit was stored to memory at: [ 1532.728769][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1532.734507][ C1] __msan_chain_origin+0x50/0x90 [ 1532.739461][ C1] tcp_conn_request+0x1781/0x4d10 [ 1532.744501][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1532.749618][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1532.754657][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1532.760032][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1532.764625][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1532.769128][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1532.774590][ C1] ip_local_deliver+0x62a/0x7c0 [ 1532.779436][ C1] ip_rcv+0x6cf/0x750 [ 1532.783418][ C1] process_backlog+0xfb5/0x14e0 [ 1532.788268][ C1] net_rx_action+0x746/0x1aa0 [ 1532.792948][ C1] __do_softirq+0x311/0x83d [ 1532.797436][ C1] [ 1532.799769][ C1] Uninit was stored to memory at: [ 1532.804805][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1532.810521][ C1] __msan_chain_origin+0x50/0x90 [ 1532.815459][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1532.820756][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1532.825796][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1532.830904][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1532.835927][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1532.841327][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1532.845914][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1532.850413][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1532.855868][ C1] ip_local_deliver+0x62a/0x7c0 [ 1532.860716][ C1] ip_rcv+0x6cf/0x750 [ 1532.864716][ C1] process_backlog+0xfb5/0x14e0 [ 1532.869563][ C1] net_rx_action+0x746/0x1aa0 [ 1532.874240][ C1] __do_softirq+0x311/0x83d [ 1532.878730][ C1] [ 1532.881050][ C1] Uninit was stored to memory at: [ 1532.886081][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1532.891799][ C1] __msan_chain_origin+0x50/0x90 [ 1532.897344][ C1] tcp_conn_request+0x1781/0x4d10 [ 1532.902366][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1532.907474][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1532.912504][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1532.917891][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1532.922496][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1532.927007][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1532.932474][ C1] ip_local_deliver+0x62a/0x7c0 [ 1532.937336][ C1] ip_rcv+0x6cf/0x750 [ 1532.941331][ C1] process_backlog+0xfb5/0x14e0 [ 1532.946193][ C1] net_rx_action+0x746/0x1aa0 [ 1532.951234][ C1] __do_softirq+0x311/0x83d [ 1532.955762][ C1] [ 1532.958094][ C1] Uninit was stored to memory at: [ 1532.963131][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1532.968856][ C1] __msan_chain_origin+0x50/0x90 [ 1532.973808][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1532.979108][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1532.984153][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1532.989271][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1532.994303][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1532.999707][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1533.004301][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1533.008805][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1533.014271][ C1] ip_local_deliver+0x62a/0x7c0 [ 1533.019123][ C1] ip_rcv+0x6cf/0x750 [ 1533.023108][ C1] process_backlog+0xfb5/0x14e0 [ 1533.027962][ C1] net_rx_action+0x746/0x1aa0 [ 1533.032638][ C1] __do_softirq+0x311/0x83d [ 1533.037129][ C1] [ 1533.039450][ C1] Uninit was stored to memory at: [ 1533.044499][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1533.050223][ C1] __msan_chain_origin+0x50/0x90 [ 1533.055160][ C1] tcp_conn_request+0x1781/0x4d10 [ 1533.060183][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1533.065297][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1533.070329][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1533.075704][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1533.080295][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1533.084806][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1533.090269][ C1] ip_local_deliver+0x62a/0x7c0 [ 1533.095118][ C1] ip_rcv+0x6cf/0x750 [ 1533.099096][ C1] process_backlog+0xfb5/0x14e0 [ 1533.103948][ C1] net_rx_action+0x746/0x1aa0 [ 1533.108630][ C1] __do_softirq+0x311/0x83d [ 1533.113128][ C1] [ 1533.115447][ C1] Uninit was stored to memory at: [ 1533.120482][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1533.126208][ C1] __msan_chain_origin+0x50/0x90 [ 1533.131152][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 1533.136435][ C1] tcp_conn_request+0x33d7/0x4d10 [ 1533.141457][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1533.146573][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1533.151606][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1533.156978][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1533.161571][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1533.166076][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1533.171533][ C1] ip_local_deliver+0x62a/0x7c0 [ 1533.176379][ C1] ip_rcv+0x6cf/0x750 [ 1533.180362][ C1] process_backlog+0xfb5/0x14e0 [ 1533.185209][ C1] net_rx_action+0x746/0x1aa0 [ 1533.189883][ C1] __do_softirq+0x311/0x83d [ 1533.194386][ C1] [ 1533.196706][ C1] Uninit was stored to memory at: [ 1533.201734][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 1533.207469][ C1] __msan_chain_origin+0x50/0x90 [ 1533.212410][ C1] tcp_conn_request+0x1781/0x4d10 [ 1533.217441][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1533.222556][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 1533.227581][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1533.232966][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1533.237566][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1533.242076][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1533.247534][ C1] ip_local_deliver+0x62a/0x7c0 [ 1533.252395][ C1] ip_rcv+0x6cf/0x750 [ 1533.256390][ C1] process_backlog+0xfb5/0x14e0 [ 1533.261261][ C1] net_rx_action+0x746/0x1aa0 [ 1533.265943][ C1] __do_softirq+0x311/0x83d [ 1533.270438][ C1] [ 1533.272761][ C1] Uninit was created at: [ 1533.277045][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 1533.282693][ C1] kmsan_alloc_page+0xb9/0x180 [ 1533.287467][ C1] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1533.293024][ C1] alloc_pages_current+0x672/0x990 [ 1533.298138][ C1] alloc_slab_page+0x122/0x1300 [ 1533.302995][ C1] new_slab+0x2bc/0x1130 [ 1533.307246][ C1] ___slab_alloc+0x14a3/0x2040 [ 1533.312020][ C1] kmem_cache_alloc+0xb23/0xd70 [ 1533.316876][ C1] inet_reqsk_alloc+0xac/0x830 [ 1533.321639][ C1] tcp_conn_request+0x753/0x4d10 [ 1533.326611][ C1] tcp_v4_conn_request+0x19b/0x240 [ 1533.331743][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 1533.337130][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 1533.341723][ C1] tcp_v4_rcv+0x425c/0x5040 [ 1533.346231][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 1533.351695][ C1] ip_local_deliver+0x62a/0x7c0 [ 1533.356551][ C1] ip_sublist_rcv+0x125d/0x1450 [ 1533.361403][ C1] ip_list_rcv+0x904/0x970 [ 1533.365835][ C1] __netif_receive_skb_list_core+0x1459/0x14d0 [ 1533.372024][ C1] netif_receive_skb_list_internal+0xf66/0x1610 [ 1533.378292][ C1] napi_complete_done+0x439/0xe10 [ 1533.383341][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 1533.388725][ C1] virtnet_poll+0x1468/0x19f0 [ 1533.393405][ C1] net_rx_action+0x746/0x1aa0 [ 1533.398082][ C1] __do_softirq+0x311/0x83d 05:59:52 executing program 4: socket(0x10, 0x803, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) 05:59:52 executing program 1: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, 0x0}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001ace000000000000000ff01fa000000000f000000080000000500000001000000000094332d6e0000000000002000010000"], 0xb8}}, 0x0) 05:59:52 executing program 0: 05:59:53 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:53 executing program 2: 05:59:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) 05:59:53 executing program 0: 05:59:53 executing program 1: [ 1534.726831][T30119] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1534.752893][T30119] device dummy0 entered promiscuous mode [ 1534.768454][T30119] device dummy0 left promiscuous mode 05:59:54 executing program 2: 05:59:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r2, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:54 executing program 0: 05:59:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) 05:59:54 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x2, 0x0, 0xb}]}}, &(0x7f0000000340)=""/142, 0x26, 0x8e, 0x8}, 0x20) 05:59:54 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x200, 0x0, &(0x7f00000000c0)="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"}) 05:59:54 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f00000000c0)='./file0\x00', 0x200480, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) exit_group(0x0) mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) futex(0x0, 0x85, 0x50000000, 0x0, &(0x7f0000000000), 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000140)="f2", 0xfffff, r0) add_key$user(0x0, 0x0, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000140)='fscrypt-provisioning\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000083f6e46b18eb15ad5719a453b75c899e57edf564f36e6a6501b883e8559cc8c4b3aeabc0a445a9454d3140030ce88ced88443abe761078adccc92f0d80bd2ba06426a108000000000000236a2d274fc87b693064955fad1145622582d187b5db1d74b7b6905493ed666c0ea2f978feaae7919c05ab88d3c7e66f58b9b1fc8dc5307dc3d1aef357acf0bdb510ccc7baa70eb1a4226ff4d338dc91b5fa8632381427b410b9d11f978a"], 0xb7, r0) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 05:59:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) acct(0x0) 05:59:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) 05:59:55 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:55 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x209, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000004c0)) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x200, 0x0, &(0x7f00000000c0)="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"}) 05:59:55 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x50}}, 0x0) [ 1536.108364][T30166] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:55 executing program 1: mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0, 0x400002172, 0xffffffffffffffff, 0x0) futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000000), 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) [ 1536.213115][T30166] device dummy0 entered promiscuous mode [ 1536.296090][T30166] device dummy0 left promiscuous mode 05:59:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r2, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x4e28, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) 05:59:55 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x4, 0x2, 0x0, 0xc}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000340)=""/142, 0x29, 0x8e, 0x8}, 0x20) 05:59:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x109002, 0x0) pwritev(r4, &(0x7f00000000c0)=[{&(0x7f0000000200)='1', 0x1}], 0x1, 0x800000) fallocate(r3, 0x100000003, 0xe0ff, 0x28120001) 05:59:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x263}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0xe20}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0xd}, {0x8, 0xf}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x0, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 05:59:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x35, 0x0, 0x2}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000005, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "df662fcc56"}, 0x6, 0x1) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40104, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, 0x0, 0x0, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) 05:59:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x5000000000016) tkill(r2, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:56 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, 0x0, 0x0, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) 05:59:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x35, 0x0, 0x2}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000005, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "df662fcc56"}, 0x6, 0x1) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40104, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:56 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x200480, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, 0x0) exit_group(0x0) mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x100000e, 0x400002172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) futex(0x0, 0x85, 0x50000000, 0x0, &(0x7f0000000000), 0x0) openat$vcsa(0xffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000140)="f2", 0xfffff, r1) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="b3dd4b9e2d23b826b4ad2ce9e923f41a35407f656330b0a3184ae132b828b7bd43a2f51669a2ee238acf814dbed9", 0x2e, r1) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000480)='asymmetric\x00', 0x0) dup(0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 05:59:56 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000140)="f2", 0xfffff, 0x0) [ 1537.832117][T30234] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:57 executing program 0: mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x100000e, 0x400002172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000000), 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) [ 1537.913927][T30232] kvm [30229]: vcpu0, guest rIP: 0x10c Hyper-V unhandled wrmsr: 0x40000005 data 0x5 [ 1537.968532][T30232] kvm [30229]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000006 05:59:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, 0x0, 0x0, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) [ 1538.012259][T30232] kvm [30229]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000001f [ 1538.069690][T30232] kvm [30229]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000059 05:59:57 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) [ 1538.152610][T30232] kvm [30229]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000062 05:59:57 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x100000e, 0x400002172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) futex(0x0, 0x85, 0x50000000, 0x0, &(0x7f0000000000), 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) [ 1538.228548][T30232] kvm [30229]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000085 05:59:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x2f) tkill(r2, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) [ 1538.376500][T30256] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:57 executing program 0: mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x100000e, 0x400002172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000000), 0x11000000) 05:59:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000013c0), 0x0, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) 05:59:58 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:58 executing program 1: mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x209, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000004c0)) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x200, 0x0, &(0x7f00000000c0)="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"}) 05:59:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x40, 0x0, 0x0) write$vhost_msg(0xffffffffffffffff, &(0x7f0000000380)={0x1, {&(0x7f0000000480)=""/81, 0x51, 0x0}}, 0x48) fstat(0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000013c0), 0x0, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) 05:59:58 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x0, 0x2, 0x0, 0xc}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000340)=""/142, 0x28, 0x8e, 0x8}, 0x20) [ 1539.087238][T30277] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:58 executing program 1: mbind(&(0x7f00008ae000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000002c0)) r1 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000180)='\x14\xccmPn\x9be\x13\x1d\xe5\x1c\x95\x14tc\x93\xe6\xd1\xa47\xf9\vc8tU\x90\x13\xf3\xfc9\x9bP\xe5\x12\x85\x9c\x86\x87\xe3\x88\xdb\xb5\xd5\xe0q\xfb\r?\x1c\xf5$Q\xdbKo\xe0\x0f\xf1W\xc9w\x10\xa9\xdeW^\x9e\x8eV\xcf8\x00\x02\xb6a\f\xe1\x8a\xeaw\xfe\x8b\xc2\nh}\xc3|p\'\xf0\x8eM-?\xccG_\x16\xa4\x1bQn\xd0\x06\xc7FIR\xd3\x88\f/@*\xe6\x8a\x13)H\xd5\xe7\xa4\xaf\xc5\xe6\xb2p$\xb9\xce\x98\xedY\x8a\xb2t\xaan|\x8a\xa9\x9dC*\xc5\r\x8e\xbb\x1e\xf6:i\xa5r`\xa4ij\x1b\x9a\xfe\x94\x95\xec26!\xe82', 0x2) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000f6cfbc292ab331b4013a2ab1beb2e3dcb2363e00029c050055c8ac08000000d8a1e99083e2fef4d4d162985548db12dd464bc5c8223b75e63e111ed2a164b488fbbcf03494636e7eac14db4fb7d16e12dc7cd056b32ffff060646a750b420061a6cce07c78a852a3a3d919cfd20a3b9222a1548f5a874bdf08bdd67a46b5457c86b3e8d0c423838e15369d57bd48cb90b660f6f05e87e36a53195bbd22e71bfddfb9a472e9f9a354ac014bd5ee49c179c46fcc3a9324b93841c8dcc7cb98ec692c6cf840277de9", @ANYRES16=0x0, @ANYBLOB="00022bbd7000ffdbdf251200000005002d0001000000"], 0x1c}}, 0x10) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r3 = syz_genetlink_get_family_id$ipvs(0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYRES64=r3, @ANYRES16=r4, @ANYBLOB="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"], 0x190}, 0x1, 0x0, 0x0, 0x4000}, 0x40895) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) r5 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x1c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) 05:59:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x2f) tkill(r2, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:58 executing program 2: futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000000), 0x5000000) 05:59:58 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000013c0), 0x0, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) 05:59:58 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000180)=ANY=[], 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) [ 1539.664596][T30308] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xf, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000100)="e0", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000100), &(0x7f0000000000)=@tcp6=r0}, 0x20) 05:59:59 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x8, 0x4, 0x4, 0x104, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100), &(0x7f0000000180)=@tcp}, 0x20) 05:59:59 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000013c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) [ 1540.169431][T30323] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:59:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x109002, 0x0) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r5, 0x100000003, 0x0, 0x28120001) pwritev(r4, &(0x7f00000000c0)=[{&(0x7f0000000200)='1', 0x1}], 0x1, 0x800000) fallocate(r3, 0x100000003, 0xe0ff, 0x28120001) 05:59:59 executing program 0: r0 = eventfd(0x0) r1 = eventfd(0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000080)={0x1, r1}) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000080)={0x1, r0}) 05:59:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000140)="f2", 0xfffff, r1) lstat(&(0x7f0000000680)='./bus/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000000c0)='./bus\x00', 0xee01, r2) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600)='cgroup.type\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)={0x80002004}) sendmsg$RDMA_NLDEV_CMD_DELLINK(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x880) 05:59:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = gettid() r4 = gettid() tkill(r4, 0x1000000000016) tkill(r3, 0x2f) tkill(r2, 0x2f) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000000)={0x0, 0x0, 0x37}, &(0x7f0000000080)) 05:59:59 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)={0x2b4, 0x1, 0x3, 0x401, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_PAYLOAD={0x71, 0xa, "0c63e153aa1d1d53776c3db7573346b0d2f45f29cff46a8f61457292f816652aaa333eb6347bc569f1ce8dc40206ebee18fcbb8134dc0b948746d0f144f75c2cffd3f07f1165534f15955e417ce5d1d97714512b48118d412204d5998147880b3af1aed8e624429b2a1831c76f"}, @NFQA_EXP={0x4c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1f}]}, @NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, @NFQA_PAYLOAD={0x41, 0xa, "769349fc5097bcf9bfdea8c157d60a89fa0abed7035d8f422e32196185a5bd89dd1eff83e43a2e57264aea8fc606c228ad050ef5aca939a15c75e5fce0"}, @NFQA_CT={0x164, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xf629}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xff800000}]}, @CTA_TUPLE_REPLY={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_NAT_SRC={0x4c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x36}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x7}}]}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2402}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x881}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="477f070021000000140012800c0001006d6163767461700013ff028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 05:59:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000013c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000c8c5) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast2}, r2}}}], 0x28}}], 0x2, 0x0) [ 1540.708057][T30348] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 06:00:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) 06:00:00 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xf, 0x4, 0x4, 0x800004, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 06:00:00 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x1600bd63, &(0x7f0000000040), 0x4) [ 1541.017057][T30352] ===================================================== [ 1541.024161][T30352] BUG: KMSAN: uninit-value in nf_conntrack_udplite_packet+0x4e8/0x1110 [ 1541.032423][T30352] CPU: 0 PID: 30352 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 1541.041116][T30352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1541.051178][T30352] Call Trace: [ 1541.054489][T30352] dump_stack+0x1df/0x240 [ 1541.058855][T30352] kmsan_report+0xf7/0x1e0 [ 1541.063328][T30352] __msan_warning+0x58/0xa0 [ 1541.067859][T30352] nf_conntrack_udplite_packet+0x4e8/0x1110 [ 1541.073791][T30352] nf_conntrack_in+0x93d/0x26b1 [ 1541.078696][T30352] ipv6_conntrack_local+0x68/0x80 [ 1541.083735][T30352] ? ipv6_conntrack_in+0x80/0x80 [ 1541.088703][T30352] nf_hook_slow+0x16e/0x400 [ 1541.093253][T30352] __ip6_local_out+0x56d/0x750 [ 1541.098056][T30352] ? __ip6_local_out+0x750/0x750 [ 1541.103008][T30352] ip6_local_out+0xa4/0x1d0 [ 1541.107535][T30352] ip6_send_skb+0xfa/0x390 [ 1541.111980][T30352] udp_v6_send_skb+0x1834/0x1e80 [ 1541.116957][T30352] udpv6_sendmsg+0x4570/0x4940 [ 1541.121729][T30352] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1541.127804][T30352] ? aa_label_sk_perm+0x767/0x930 [ 1541.132841][T30352] ? udpv6_sendmsg+0x4940/0x4940 [ 1541.137825][T30352] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1541.143902][T30352] ? aa_sk_perm+0x83c/0xcd0 [ 1541.148454][T30352] ? udpv6_rcv+0x70/0x70 [ 1541.152698][T30352] ? udpv6_rcv+0x70/0x70 [ 1541.156945][T30352] inet6_sendmsg+0x276/0x2e0 [ 1541.161554][T30352] kernel_sendmsg+0x24a/0x440 [ 1541.166251][T30352] sock_no_sendpage+0x235/0x300 [ 1541.171131][T30352] ? sock_no_mmap+0x30/0x30 [ 1541.175644][T30352] sock_sendpage+0x1e1/0x2c0 [ 1541.180267][T30352] pipe_to_sendpage+0x38c/0x4c0 [ 1541.185129][T30352] ? sock_fasync+0x250/0x250 [ 1541.189751][T30352] __splice_from_pipe+0x565/0xf00 [ 1541.194788][T30352] ? generic_splice_sendpage+0x2d0/0x2d0 [ 1541.200470][T30352] generic_splice_sendpage+0x1d5/0x2d0 [ 1541.206117][T30352] ? iter_file_splice_write+0x1800/0x1800 [ 1541.211846][T30352] direct_splice_actor+0x1fd/0x580 [ 1541.216977][T30352] ? kmsan_get_metadata+0x4f/0x180 [ 1541.222109][T30352] splice_direct_to_actor+0x6b2/0xf50 [ 1541.227485][T30352] ? do_splice_direct+0x580/0x580 [ 1541.232550][T30352] do_splice_direct+0x342/0x580 [ 1541.237436][T30352] do_sendfile+0x101b/0x1d40 [ 1541.242073][T30352] __se_sys_sendfile64+0x2bb/0x360 [ 1541.247190][T30352] ? kmsan_get_metadata+0x4f/0x180 [ 1541.252325][T30352] __x64_sys_sendfile64+0x56/0x70 [ 1541.257361][T30352] do_syscall_64+0xb0/0x150 [ 1541.261873][T30352] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1541.267765][T30352] RIP: 0033:0x45c1d9 [ 1541.271648][T30352] Code: Bad RIP value. [ 1541.275711][T30352] RSP: 002b:00007fb6c6790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1541.284135][T30352] RAX: ffffffffffffffda RBX: 00000000000260c0 RCX: 000000000045c1d9 [ 1541.292103][T30352] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 1541.300070][T30352] RBP: 000000000078bf48 R08: 0000000000000000 R09: 0000000000000000 [ 1541.308058][T30352] R10: 000000000000a808 R11: 0000000000000246 R12: 000000000078bf0c [ 1541.316048][T30352] R13: 0000000000c9fb6f R14: 00007fb6c67919c0 R15: 000000000078bf0c [ 1541.324037][T30352] [ 1541.326359][T30352] Uninit was stored to memory at: [ 1541.331389][T30352] kmsan_internal_chain_origin+0xad/0x130 [ 1541.337123][T30352] __msan_chain_origin+0x50/0x90 [ 1541.342068][T30352] udp_v6_send_skb+0x19f5/0x1e80 [ 1541.347013][T30352] udpv6_sendmsg+0x4570/0x4940 [ 1541.351779][T30352] inet6_sendmsg+0x276/0x2e0 [ 1541.356372][T30352] kernel_sendmsg+0x24a/0x440 [ 1541.361044][T30352] sock_no_sendpage+0x235/0x300 [ 1541.365895][T30352] sock_sendpage+0x1e1/0x2c0 [ 1541.370483][T30352] pipe_to_sendpage+0x38c/0x4c0 [ 1541.375353][T30352] __splice_from_pipe+0x565/0xf00 [ 1541.380376][T30352] generic_splice_sendpage+0x1d5/0x2d0 [ 1541.385833][T30352] direct_splice_actor+0x1fd/0x580 [ 1541.390943][T30352] splice_direct_to_actor+0x6b2/0xf50 [ 1541.396329][T30352] do_splice_direct+0x342/0x580 [ 1541.401179][T30352] do_sendfile+0x101b/0x1d40 [ 1541.405768][T30352] __se_sys_sendfile64+0x2bb/0x360 [ 1541.410876][T30352] __x64_sys_sendfile64+0x56/0x70 [ 1541.415899][T30352] do_syscall_64+0xb0/0x150 [ 1541.420404][T30352] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1541.426280][T30352] [ 1541.428683][T30352] Uninit was stored to memory at: [ 1541.433725][T30352] kmsan_internal_chain_origin+0xad/0x130 [ 1541.439449][T30352] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 1541.445427][T30352] kmsan_memcpy_metadata+0xb/0x10 [ 1541.450450][T30352] __msan_memcpy+0x43/0x50 [ 1541.454887][T30352] _copy_from_iter_full+0xbfe/0x13b0 [ 1541.460190][T30352] udplite_getfrag+0xb1/0x130 [ 1541.464870][T30352] __ip6_append_data+0x507b/0x6320 [ 1541.469980][T30352] ip6_make_skb+0x6ce/0xcf0 [ 1541.474482][T30352] udpv6_sendmsg+0x42f4/0x4940 [ 1541.479241][T30352] inet6_sendmsg+0x276/0x2e0 [ 1541.483829][T30352] kernel_sendmsg+0x24a/0x440 [ 1541.488501][T30352] sock_no_sendpage+0x235/0x300 [ 1541.493350][T30352] sock_sendpage+0x1e1/0x2c0 [ 1541.497937][T30352] pipe_to_sendpage+0x38c/0x4c0 [ 1541.502783][T30352] __splice_from_pipe+0x565/0xf00 [ 1541.507804][T30352] generic_splice_sendpage+0x1d5/0x2d0 [ 1541.513266][T30352] direct_splice_actor+0x1fd/0x580 [ 1541.518374][T30352] splice_direct_to_actor+0x6b2/0xf50 [ 1541.523747][T30352] do_splice_direct+0x342/0x580 [ 1541.528596][T30352] do_sendfile+0x101b/0x1d40 [ 1541.533183][T30352] __se_sys_sendfile64+0x2bb/0x360 [ 1541.538292][T30352] __x64_sys_sendfile64+0x56/0x70 [ 1541.543319][T30352] do_syscall_64+0xb0/0x150 [ 1541.547825][T30352] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1541.553701][T30352] [ 1541.556023][T30352] Uninit was created at: [ 1541.560262][T30352] kmsan_save_stack_with_flags+0x3c/0x90 [ 1541.565899][T30352] kmsan_alloc_page+0xb9/0x180 [ 1541.570659][T30352] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1541.576204][T30352] alloc_pages_current+0x672/0x990 [ 1541.581310][T30352] push_pipe+0x605/0xb70 [ 1541.585556][T30352] iov_iter_get_pages_alloc+0x18a9/0x21c0 [ 1541.591277][T30352] do_splice_to+0x4fc/0x14f0 [ 1541.595869][T30352] splice_direct_to_actor+0x45c/0xf50 [ 1541.601236][T30352] do_splice_direct+0x342/0x580 [ 1541.606086][T30352] do_sendfile+0x101b/0x1d40 [ 1541.610673][T30352] __se_sys_sendfile64+0x2bb/0x360 [ 1541.615782][T30352] __x64_sys_sendfile64+0x56/0x70 [ 1541.620803][T30352] do_syscall_64+0xb0/0x150 [ 1541.625306][T30352] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1541.631189][T30352] ===================================================== [ 1541.638110][T30352] Disabling lock debugging due to kernel taint [ 1541.644255][T30352] Kernel panic - not syncing: panic_on_warn set ... [ 1541.650845][T30352] CPU: 0 PID: 30352 Comm: syz-executor.1 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 1541.660895][T30352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1541.670943][T30352] Call Trace: [ 1541.674246][T30352] dump_stack+0x1df/0x240 [ 1541.678586][T30352] panic+0x3d5/0xc3e [ 1541.682522][T30352] kmsan_report+0x1df/0x1e0 [ 1541.687035][T30352] __msan_warning+0x58/0xa0 [ 1541.691546][T30352] nf_conntrack_udplite_packet+0x4e8/0x1110 [ 1541.697465][T30352] nf_conntrack_in+0x93d/0x26b1 [ 1541.702367][T30352] ipv6_conntrack_local+0x68/0x80 [ 1541.707398][T30352] ? ipv6_conntrack_in+0x80/0x80 [ 1541.712341][T30352] nf_hook_slow+0x16e/0x400 [ 1541.716865][T30352] __ip6_local_out+0x56d/0x750 [ 1541.721645][T30352] ? __ip6_local_out+0x750/0x750 [ 1541.726614][T30352] ip6_local_out+0xa4/0x1d0 [ 1541.731139][T30352] ip6_send_skb+0xfa/0x390 [ 1541.735577][T30352] udp_v6_send_skb+0x1834/0x1e80 [ 1541.740547][T30352] udpv6_sendmsg+0x4570/0x4940 [ 1541.745315][T30352] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1541.751409][T30352] ? aa_label_sk_perm+0x767/0x930 [ 1541.756449][T30352] ? udpv6_sendmsg+0x4940/0x4940 [ 1541.761425][T30352] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1541.767494][T30352] ? aa_sk_perm+0x83c/0xcd0 [ 1541.772044][T30352] ? udpv6_rcv+0x70/0x70 [ 1541.776288][T30352] ? udpv6_rcv+0x70/0x70 [ 1541.780538][T30352] inet6_sendmsg+0x276/0x2e0 [ 1541.785151][T30352] kernel_sendmsg+0x24a/0x440 [ 1541.789858][T30352] sock_no_sendpage+0x235/0x300 [ 1541.794744][T30352] ? sock_no_mmap+0x30/0x30 [ 1541.799254][T30352] sock_sendpage+0x1e1/0x2c0 [ 1541.803868][T30352] pipe_to_sendpage+0x38c/0x4c0 [ 1541.808725][T30352] ? sock_fasync+0x250/0x250 [ 1541.813356][T30352] __splice_from_pipe+0x565/0xf00 [ 1541.818393][T30352] ? generic_splice_sendpage+0x2d0/0x2d0 [ 1541.824059][T30352] generic_splice_sendpage+0x1d5/0x2d0 [ 1541.829543][T30352] ? iter_file_splice_write+0x1800/0x1800 [ 1541.835270][T30352] direct_splice_actor+0x1fd/0x580 [ 1541.840400][T30352] ? kmsan_get_metadata+0x4f/0x180 [ 1541.845529][T30352] splice_direct_to_actor+0x6b2/0xf50 [ 1541.850908][T30352] ? do_splice_direct+0x580/0x580 [ 1541.855988][T30352] do_splice_direct+0x342/0x580 [ 1541.860873][T30352] do_sendfile+0x101b/0x1d40 [ 1541.865510][T30352] __se_sys_sendfile64+0x2bb/0x360 [ 1541.870629][T30352] ? kmsan_get_metadata+0x4f/0x180 [ 1541.875759][T30352] __x64_sys_sendfile64+0x56/0x70 [ 1541.880798][T30352] do_syscall_64+0xb0/0x150 [ 1541.885312][T30352] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1541.891205][T30352] RIP: 0033:0x45c1d9 [ 1541.895088][T30352] Code: Bad RIP value. [ 1541.899148][T30352] RSP: 002b:00007fb6c6790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1541.907561][T30352] RAX: ffffffffffffffda RBX: 00000000000260c0 RCX: 000000000045c1d9 [ 1541.915537][T30352] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 1541.923510][T30352] RBP: 000000000078bf48 R08: 0000000000000000 R09: 0000000000000000 [ 1541.931482][T30352] R10: 000000000000a808 R11: 0000000000000246 R12: 000000000078bf0c [ 1541.939465][T30352] R13: 0000000000c9fb6f R14: 00007fb6c67919c0 R15: 000000000078bf0c [ 1541.948664][T30352] Kernel Offset: 0x2c800000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1541.960297][T30352] Rebooting in 86400 seconds..