route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000008100000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 751.288479][ T3944] IPVS: ftp: loaded support on port[0] = 21 01:51:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x12, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x2000d310, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:34 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd2c) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 751.544277][ T3956] __nla_validate_parse: 6 callbacks suppressed [ 751.544286][ T3956] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x2000d323, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 751.744267][ T3967] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:34 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x98, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:34 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd2f) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="10000000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x13, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000000e8, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000080)=0x7523966c, 0x4) exit_group(0xc45) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 01:51:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300ffffa88800000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 752.280507][ T3990] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4020000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x66886e1452b394, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x2, 0x62, &(0x7f0000000240)=""/98}, {0x0, 0x19, &(0x7f00000001c0)=""/25}]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000200), 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaadba, &(0x7f0000000040)=[{&(0x7f0000000340)="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", 0x46, 0x10000}], 0x9, 0x0) [ 752.346450][ T4001] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:35 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd30) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 752.395530][ T4000] IPVS: ftp: loaded support on port[0] = 21 01:51:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300ffffff9e00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4030000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 752.645404][ T4017] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:36 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x9a, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x28, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300ffffffa600000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:36 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd31) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4050000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 753.414855][ T4044] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:36 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x98, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) [ 753.506758][ T4055] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 753.534241][ T4048] IPVS: ftp: loaded support on port[0] = 21 01:51:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x2d, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000ec000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:36 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd32) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4060000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 753.635426][ T4061] IPVS: ftp: loaded support on port[0] = 21 [ 753.831139][ T4076] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4070000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 754.043442][ T4081] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:37 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xa6, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x5f, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:37 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd33) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4080000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300fffffff000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:37 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd32) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 754.627469][ T4099] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b40a0000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 754.726419][ T4102] IPVS: ftp: loaded support on port[0] = 21 01:51:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x60, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000ff00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4100000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:37 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd34) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = socket$packet(0x11, 0x20000000000003, 0x300) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000000), 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r3, 0x3, 0x6, @random="e09bf7dbe39f"}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r2, 0x4) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0xfffffffffffffef8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRES64, @ANYRESDEC], @ANYRES32=r7, @ANYBLOB="00000000f1ffffff0000400008000100736662007584836faca2eb53d242dd21d62c000200160001000000000025a80765bccdd7ef00000000000000000000001e91d2c3b01100000000000002"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000040)={'vcan0\x00', r7}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_CONNECT(r11, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000063c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_ERSPAN_VER={0x8, 0x9}], @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r12}]]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r9, 0x29, 0x32, &(0x7f0000000140)={@empty, r12}, 0x14) socket$nl_generic(0x10, 0x3, 0x10) [ 755.416474][ T4137] device lo entered promiscuous mode [ 755.574826][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 755.580688][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 755.649952][ T4143] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 755.681732][ T4143] batman_adv: Cannot find parent device [ 755.691216][ T4134] device lo left promiscuous mode [ 755.751309][ T4141] device lo entered promiscuous mode [ 755.775590][ T4134] device lo left promiscuous mode [ 755.787783][ T4141] netlink: 'syz-executor.2': attribute type 9 has an invalid length. 01:51:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4480000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030088a8ffff00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:38 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd35) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 755.803406][ T4141] batman_adv: Cannot find parent device 01:51:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = socket$packet(0x11, 0x20000000000003, 0x300) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000000), 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r3, 0x3, 0x6, @random="e09bf7dbe39f"}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r2, 0x4) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0xfffffffffffffef8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="8100000000000000280012000c0001007665746800000000180002001400010000000000bb5831f82a22719cd08dcd86b2005673bffb6582b3a78a8ff2d3e72d89fe8c0c810901dcdfaaa1f1f130be1f38c51bdc330b252c3b497bb47399f537c07dc6f436f186e83ce7017d55a1b78fe362455679fd22cc78003118d91527aea0c1dfc1a9ab1672a6acbf8c7bb46b462a45573a96c97c268f02acab99ee9fe88cc1db35af6003cdac63662bff000000000000007dd809fd76a59933e4bac57d1b9580dffae972945f768f6cfb1d680b3c4418caf6927f94231eb1f1a93741764fad5558c29f177864d256a2882f71f14796107c627728075b7c30131e2ac84b243d546a12b09d4e", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRES64, @ANYRESDEC], @ANYRES32=r7, @ANYBLOB="00000000f1ffffff0000400008000100736662007584836faca2eb53d242dd21d62c000200160001000000000025a80765bccdd7ef00000000000000000000001e91d2c3b01100000000000002"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000040)={'vcan0\x00', r7}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_CONNECT(r11, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000063c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_ERSPAN_VER={0x8, 0x9}], @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r12}]]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r9, 0x29, 0x32, &(0x7f0000000140)={@empty, r12}, 0x14) socket$nl_generic(0x10, 0x3, 0x10) 01:51:38 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xca, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b44c0000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 756.013930][ T4166] IPVS: ftp: loaded support on port[0] = 21 01:51:38 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd36) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 756.070865][ T4160] device lo entered promiscuous mode 01:51:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000f0ffff00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x180, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 756.278414][ T4160] netlink: 'syz-executor.2': attribute type 9 has an invalid length. 01:51:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4680000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:39 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf01) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 756.456206][ T4160] batman_adv: Cannot find parent device 01:51:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b46c0000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 756.652169][ T4195] __nla_validate_parse: 4 callbacks suppressed [ 756.652179][ T4195] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 756.666619][ T4155] device lo left promiscuous mode 01:51:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303007fffffff00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = socket$packet(0x11, 0x20000000000003, 0x300) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000000), 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r3, 0x3, 0x6, @random="e09bf7dbe39f"}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r2, 0x4) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0xfffffffffffffef8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRES64, @ANYRESDEC], @ANYRES32=r7, @ANYBLOB="00000000f1ffffff0000400008000100736662007584836faca2eb53d242dd21d62c000200160001000000000025a80765bccdd7ef00000000000000000000001e91d2c3b01100000000000002"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000040)={'vcan0\x00', r7}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_CONNECT(r11, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000063c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_ERSPAN_VER={0x8, 0x9}], @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r12}]]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r9, 0x29, 0x32, &(0x7f0000000140)={@empty, r12}, 0x14) socket$nl_generic(0x10, 0x3, 0x10) 01:51:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4740000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 756.943596][ T4214] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 757.091087][ T4218] device lo entered promiscuous mode [ 757.119788][ T4220] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 757.238226][ T4218] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 757.254763][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 757.260580][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 757.294045][ T4218] batman_adv: Cannot find parent device [ 757.379684][ T4211] device lo left promiscuous mode 01:51:40 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xd2, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:40 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1001) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x500, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b47a0000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303009effffff00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:40 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf01) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 757.691771][ T4238] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000300832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x600, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 757.826025][ T4248] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:40 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf01) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4f60300832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 757.950255][ T4247] IPVS: ftp: loaded support on port[0] = 21 01:51:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300a6ffffff00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000500832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 758.316619][ T4269] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 758.426982][ T4274] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:41 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xdc, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x700, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:41 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1003) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300f0ffffff00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:41 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1001) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000600832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 758.847418][ T4288] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000700832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 758.926359][ T4296] IPVS: ftp: loaded support on port[0] = 21 [ 758.936459][ T4298] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:41 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x100d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x900, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000000010000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:41 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xd2, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000a00832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 759.262123][ T4312] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 759.477445][ T4321] IPVS: ftp: loaded support on port[0] = 21 01:51:42 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x104, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4002000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x110d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xa00, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000000038000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:42 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd34) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4003f00832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 760.036954][ T4348] IPVS: ftp: loaded support on port[0] = 21 01:51:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x120d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xb00, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4004000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:43 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd34) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4004800832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000000067000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xb2b, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:43 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x32}, 0x0, @in6=@rand_addr="00c8e8767e00", 0x0, 0x0, 0x0, 0x5}}, 0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CHECK_EXTENSION_VM(r4, 0xae03, 0x101) 01:51:43 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x116, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:43 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x130d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4004c00832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 761.208357][ T4404] IPVS: ftp: loaded support on port[0] = 21 01:51:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000000081000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xe00, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4006800832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:44 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x140d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4006c00832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000000000ff000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf00, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 762.160335][ T4525] __nla_validate_parse: 5 callbacks suppressed [ 762.160345][ T4525] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4007400832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr, 0x200000}, 0x20) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22, 0x0, @rand_addr, 0x12}, 0x1c) r2 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000200)=""/83) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000)={0x1, 0xfffffffffffffff7}, 0x8) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$VIDIOC_G_FMT(r4, 0xc0d05604, &(0x7f0000000100)={0x4, @sdr={0x41414270, 0x2}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}, 0x7}, {0xa, 0x4e20, 0x7f, @remote, 0xfffffffd}, 0x9a2, [0x1ff, 0x4, 0x4, 0x3ff, 0x6, 0x5, 0x1, 0x8e]}, 0x5c) [ 762.365795][ T4530] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 762.375870][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 762.420457][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:51:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000002000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x1100, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:45 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x150d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:45 executing program 2: sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)={0x1cc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @dev}}, {0x14, 0x2, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}]}, 0x1cc}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaab43, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xffe8, 0x400}], 0x5, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c002008178a8001600400005000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) r1 = dup(r0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000000140)={'bond_slave_1\x00', 0x100, 0x9}) 01:51:45 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x118, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4007a00832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 762.838774][ T4555] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 762.888034][ T4560] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 01:51:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b403f600832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 762.943413][ T4560] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 762.950920][ T4561] IPVS: ftp: loaded support on port[0] = 21 01:51:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x1200, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:45 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x160d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 763.068316][ T4566] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000003000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400ff00832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 763.217113][ T4560] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 763.277193][ T4560] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 01:51:46 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x150d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 763.405734][ T4586] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x1300, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000200832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:46 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x170d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000004000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 763.835045][ T4614] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:46 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x12e, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0xc0c0583b, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000280)={r4, 0x0, 0x0}, 0x18) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 01:51:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000300832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:46 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x180d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x1400, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000005000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 764.341403][ T4634] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000400832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 764.474316][ T4637] IPVS: ftp: loaded support on port[0] = 21 [ 764.488474][ T4647] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x2800, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:47 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1903) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000006000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000500832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000007000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:48 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x130, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x2b0b, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:48 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x190d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:48 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x170d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000008000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000600832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000700832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x2d00, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 765.647950][ T4699] IPVS: ftp: loaded support on port[0] = 21 01:51:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000009000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000800832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:48 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1a00) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:48 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x170d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:49 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x137, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000a000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x3f00, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000a00832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:49 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1a0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:49 executing program 2: prctl$PR_GET_DUMPABLE(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x0, "8b63e98a6e9a990ceacccaa0722f7b17adbfb251c09e5993d319d88199f6923e646c1d3eaad49bc3c0a86bd1683c51ec36b5d2dab5a220e04e0b20637e2b5a8dd3403bbe1ccf681d083e2307d3f5597b"}, 0xd8) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f00000000c0)={0x10, 0x7f, 0x81}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc0000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ftruncate(r2, 0x2081ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200000, 0x0) fanotify_mark(r4, 0x80, 0x40000002, r5, &(0x7f0000000300)='./file0\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='wlan0&\x00', r2}, 0x10) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) fsetxattr$trusted_overlay_upper(r6, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="00fb210803b41444ac08bb83aaa85693b90047f0a37d67bee07b"], 0x21, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\x16\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') 01:51:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4001000832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:49 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1b0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 766.686896][ T4750] IPVS: ftp: loaded support on port[0] = 21 01:51:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000b000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x4000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4004800832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000c000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 767.541975][ T4785] __nla_validate_parse: 9 callbacks suppressed [ 767.541984][ T4785] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 767.686458][ T4787] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:50 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x13e, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x5f00, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:50 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1c00) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000d000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4004c00832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 768.112834][ T4801] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 768.174190][ T4804] IPVS: ftp: loaded support on port[0] = 21 [ 768.212114][ T4807] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:51 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1b0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x6000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4006800832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000e000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:51 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1c0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 768.670720][ T4825] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4006c00832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 768.857865][ T4834] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:51 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x15a, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000f000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:51 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1b0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:51 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1d0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4007400832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 769.244858][ T4854] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x20000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4007a00832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 769.449147][ T4858] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 769.456846][ T4857] IPVS: ftp: loaded support on port[0] = 21 01:51:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000010000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:52 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c002008178a8001600400005000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c002008178a8001600400005000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000380)=0xfdf9) rt_sigqueueinfo(r5, 0x12, &(0x7f0000000100)={0x3b, 0x17, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001900)="2e0000001d008104e00f80ecdb4cb9d902631912140202003b000000120001081506000040d819a90600150000ff", 0x2e}], 0x1}, 0x0) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) fcntl$dupfd(r6, 0x406, r1) 01:51:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000003832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x34000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 769.703158][ T4875] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400f603832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 769.898630][ T4883] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 769.924911][ T4883] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 770.005694][ T4885] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 770.200330][ T4883] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 770.264018][ T4861] IPVS: ftp: loaded support on port[0] = 21 01:51:55 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x160, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000048000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x400300, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:55 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1e0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000005832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:55 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c002008178a8001600400005000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c002008178a8001600400005000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000380)=0xfdf9) rt_sigqueueinfo(r5, 0x12, &(0x7f0000000100)={0x3b, 0x17, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001900)="2e0000001d008104e00f80ecdb4cb9d902631912140202003b000000120001081506000040d819a90600150000ff", 0x2e}], 0x1}, 0x0) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) fcntl$dupfd(r6, 0x406, r1) [ 772.665010][ T4911] __nla_validate_parse: 4 callbacks suppressed [ 772.665019][ T4911] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 772.734923][ T4914] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 01:51:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000006832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 772.779597][ T4914] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 772.828964][ T4918] IPVS: ftp: loaded support on port[0] = 21 [ 772.840462][ T4917] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 01:51:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf0ffff, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 772.874902][ T4917] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 772.903006][ T4920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:55 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1f0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000007832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300004c000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 772.987142][ T4914] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 01:51:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400000a832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 773.220341][ T4940] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:56 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x168, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x1000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:56 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1e0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:56 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x200d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000020832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000060000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 773.745349][ T4962] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400003f832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 773.821773][ T4968] IPVS: ftp: loaded support on port[0] = 21 01:51:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x1800000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000068000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:56 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1e0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000040832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 774.164523][ T4984] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:57 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x210d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:57 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x172, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000048832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300006c000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x2000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:57 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1d0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:57 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x220d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400004c832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 774.857063][ T5020] IPVS: ftp: loaded support on port[0] = 21 01:51:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x3000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 774.925512][ T5022] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:57 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x230d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:57 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1d0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000068832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 775.189698][ T5035] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:51:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000074000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:58 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x184, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x4000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:58 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x220d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:58 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x240d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400006c832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300007a000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000074832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 776.083630][ T5074] IPVS: ftp: loaded support on port[0] = 21 01:51:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000f0000000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x5000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:58 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x250d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400007a832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000040)={0xff, 0x36314d4e, 0x1, @stepwise={0x800, 0x44e, 0x7, 0x5, 0x9, 0x1}}) sendmsg$nl_xfrm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000600)=@updsa={0xf0, 0x1a, 0x11, 0x0, 0x0, {{@in6=@ipv4={[], [], @local}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x1}, {@in=@broadcast}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000200)={r4, 0x1, 0x6, @broadcast}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_matches\x00') r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c002008178a8001600400005000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) fsetxattr(r6, &(0x7f00000012c0)=@random={'security.', '\x00'}, &(0x7f0000001300)='/dev/video1\x00', 0xc, 0x2) preadv(r5, &(0x7f00000013c0)=[{0x0}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x2, 0x0) getsockname$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000340)=0x1c) r7 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(r9, 0x80287010, &(0x7f0000001380)) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c002008178a8001600400005000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) r10 = dup3(r7, 0xffffffffffffffff, 0xc0000) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001340)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_G_PARM(r10, 0xc0cc5615, &(0x7f0000000240)={0x4, @capture={0x1000, 0x1, {0x0, 0x80000000}, 0x9, 0x81}}) [ 776.577092][ T5102] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 776.625354][ T5102] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 776.675432][ T5105] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 776.787577][ T5105] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 01:51:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b40003f6832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000030000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:51:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x6000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:51:59 executing program 2: 01:51:59 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1aa, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:51:59 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2602) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:51:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b40000ff832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:51:59 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x4003) close(r0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000180)='/dev/uinput\x00'], 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000200)=[&(0x7f0000000000)='=%usetselinux^md5sum,selfcpuset+#\\cpuset\x00']) 01:52:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 777.359357][ T5128] IPVS: ftp: loaded support on port[0] = 21 01:52:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000050000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000002832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) 01:52:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x8000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 777.767534][ T5155] __nla_validate_parse: 11 callbacks suppressed [ 777.767543][ T5155] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000003832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:00 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x260d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300007a050000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 778.146150][ T5176] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:01 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1ba, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000002c0)=""/210) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x9000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000004832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:01 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x270d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000060000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 778.601809][ T5192] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000005832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 778.721337][ T5204] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000002c0)=""/210) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:01 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x280d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 778.805973][ T5206] IPVS: ftp: loaded support on port[0] = 21 01:52:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xa000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000070000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000006832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 778.980214][ T5219] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:02 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1bc, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:02 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000002c0)=""/210) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000090000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000007832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xb000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:02 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x290d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 779.603908][ T5244] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000008832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 779.684104][ T5254] IPVS: ftp: loaded support on port[0] = 21 [ 779.719221][ T5261] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:02 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000002c0)=""/210) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xe000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400000a832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000a0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 780.040915][ T5279] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000010832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 780.227736][ T5284] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:03 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1be, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:03 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2a00) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:03 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000002c0)=""/210) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) 01:52:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000048832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000b0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400004c832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 780.618300][ T5303] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 780.643294][ T5305] IPVS: ftp: loaded support on port[0] = 21 01:52:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000068832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000c0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x10000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400006c832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:03 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2a0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000d0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000074832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x11000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:04 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2b0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:04 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1c4, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:04 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000002c0)=""/210) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) 01:52:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400007a832ff2e4bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000e0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 781.693749][ T5364] IPVS: ftp: loaded support on port[0] = 21 01:52:04 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2c0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x12000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b40000000a000000bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000c00e0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000ffe0f505bd11feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x13000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000f0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:05 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2d0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:05 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1c8, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e41011feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x14000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000200000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:05 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000002c0)=""/210) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) 01:52:05 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2e0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd10feff000000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 782.983120][ T5427] __nla_validate_parse: 7 callbacks suppressed [ 782.983130][ T5427] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 783.118123][ T5431] IPVS: ftp: loaded support on port[0] = 21 01:52:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff020000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x28000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000003f0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 783.441315][ T5453] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff030000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:06 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2f0d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:06 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1d2, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x2b0b0000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff040000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000400000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:06 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:06 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 784.172523][ T5478] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff050000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 784.269313][ T5486] IPVS: ftp: loaded support on port[0] = 21 01:52:07 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:07 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x300d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x2d000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000480000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff060000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 784.638001][ T5512] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:07 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1da, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:07 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff070000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:07 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x310d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000004c0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x3f000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 785.300943][ T5538] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff080000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:08 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 785.387296][ T5543] IPVS: ftp: loaded support on port[0] = 21 [ 785.398458][ T5546] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:08 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x320d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x40000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000065580000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0a0000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 785.819234][ T5565] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 785.953965][ T5575] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:08 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x202, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:08 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:08 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3300) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff100000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x5f000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000600000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 786.299991][ T5592] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff480000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 786.374445][ T5595] IPVS: ftp: loaded support on port[0] = 21 01:52:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x60000000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:09 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:09 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x330d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000058650000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff4c0000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 786.726089][ T5622] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:09 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x20c, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:09 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x340d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x9effffff, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:09 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff680000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000680000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff6c0000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:10 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 787.329815][ T5654] IPVS: ftp: loaded support on port[0] = 21 01:52:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000006c0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:10 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x350d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff740000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:10 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x226, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:10 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xffff0000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:10 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x360d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff7a0000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000740000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000300004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 788.213916][ T5704] __nla_validate_parse: 4 callbacks suppressed [ 788.213925][ T5704] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:10 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 788.309720][ T5711] IPVS: ftp: loaded support on port[0] = 21 01:52:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xfffff000, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11fefff60300004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:11 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3c01) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000007a0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 788.720808][ T5740] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 788.842098][ T5745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:11 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x228, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:11 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000500004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:11 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3e00) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xffffff7f, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000057a0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000600004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 789.275483][ T5758] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 789.300110][ T5767] IPVS: ftp: loaded support on port[0] = 21 01:52:12 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3e01) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:12 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xffffff9e, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000700004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000810000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 789.654466][ T5795] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:13 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x242, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:13 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3f00) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:13 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000a00004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xfffffff0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000ec00000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 790.355052][ T5813] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 790.463744][ T5825] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff002000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:13 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 790.514661][ T5822] IPVS: ftp: loaded support on port[0] = 21 01:52:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000f00000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xffffffff, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:13 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff003f00004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 790.812959][ T5841] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 790.937666][ T5846] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:14 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x260, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:14 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000ff0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff004000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0xf, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:14 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4002) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 791.613938][ T5872] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 791.700992][ T5875] IPVS: ftp: loaded support on port[0] = 21 01:52:14 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000400300000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:14 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4202) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff004800004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff004c00004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:15 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x2c0, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:15 executing program 2: r0 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000034000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x107, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:15 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4203) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff006800004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x109, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff006c00004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 792.872278][ T5921] IPVS: ftp: loaded support on port[0] = 21 01:52:15 executing program 2: r0 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000fffff000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:15 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4c00) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff007400004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 793.225854][ T5941] __nla_validate_parse: 7 callbacks suppressed [ 793.225865][ T5941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x2c0, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:16 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x2d2, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff007a00004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000001000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:16 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4c02) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 793.816025][ T5964] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0xec0, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 793.876371][ T5970] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff03f600004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 793.929393][ T5971] IPVS: ftp: loaded support on port[0] = 21 01:52:16 executing program 2: write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) 01:52:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000002000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x33fe0, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00ff00004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:16 executing program 2: write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) [ 794.189995][ T5988] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x200003b8, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 794.394545][ T5995] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:17 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x2d4, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:17 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4c03) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:17 executing program 2: write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) 01:52:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000020004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000003000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x7ffff000, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 794.953496][ T6017] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0xfffffdef, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:17 executing program 2: r0 = socket(0x0, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000014500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 795.079282][ T6022] IPVS: ftp: loaded support on port[0] = 21 01:52:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000004000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:18 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4e00) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000024500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 795.535857][ T6043] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:18 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x2dc, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x2, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000034500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:18 executing program 2: r0 = socket(0x0, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:18 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x5003) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000005000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 795.991177][ T6067] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0xa, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000044500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 796.087171][ T6073] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 796.124037][ T6071] IPVS: ftp: loaded support on port[0] = 21 01:52:18 executing program 2: r0 = socket(0x0, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000006000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000054500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 796.281343][ T6082] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=10 sclass=netlink_xfrm_socket pig=6082 comm=syz-executor.5 01:52:19 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x5402) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 796.564929][ T6093] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 796.934028][ T6074] IPVS: ftp: loaded support on port[0] = 21 01:52:19 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x2e6, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0xf, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:19 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000007000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000064500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:19 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x5a03) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 797.172229][ T6116] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=15 sclass=netlink_xfrm_socket pig=6116 comm=syz-executor.5 01:52:19 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000074500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x26, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000008000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 797.357453][ T6125] IPVS: ftp: loaded support on port[0] = 21 01:52:20 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x7201) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000084500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:20 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x2f8, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:20 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x2f, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000a4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000009000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:20 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x7801) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 798.181959][ T6161] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=47 sclass=netlink_xfrm_socket pig=6161 comm=syz-executor.5 01:52:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000104500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:21 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 798.246312][ T6167] __nla_validate_parse: 5 callbacks suppressed [ 798.246323][ T6167] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:21 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x7c03) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 798.403059][ T6165] IPVS: ftp: loaded support on port[0] = 21 01:52:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000a000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:21 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 798.667596][ T6187] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 798.839771][ T6197] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x2, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000003f4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:21 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:21 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x8003) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:21 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x300, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000b000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:22 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 799.305409][ T6211] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000404500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 799.386286][ T6216] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000c000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 799.515155][ T6217] IPVS: ftp: loaded support on port[0] = 21 01:52:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x3, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000484500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:22 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:22 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x8004) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 799.792223][ T6238] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000004c4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:22 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x4, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:23 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x310, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000d000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:23 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x8400) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000684500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:23 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x5, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 800.659397][ T6280] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000006c4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:23 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 800.726902][ T6283] IPVS: ftp: loaded support on port[0] = 21 01:52:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x6, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 800.851482][ T6292] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:23 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000e000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000744500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 801.262207][ T6308] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 801.386634][ T6313] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:24 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x33e, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:24 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x9a02) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:24 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x7, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000007a4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000f000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000003f64500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:24 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:24 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xa002) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 801.904508][ T6333] IPVS: ftp: loaded support on port[0] = 21 01:52:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000010000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x8, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000ff4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:25 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x35a, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:25 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x9, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000000500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:25 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xb603) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000020000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000001000000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:25 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 802.919397][ T6382] IPVS: ftp: loaded support on port[0] = 21 01:52:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xa, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000003f000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000001800000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:25 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 803.368436][ T6402] __nla_validate_parse: 5 callbacks suppressed [ 803.368445][ T6402] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:26 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x364, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000200004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:26 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xc001) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xb, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:26 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000040000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 804.031479][ T6424] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000300004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:26 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xe, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 804.186282][ T6433] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000048000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000400004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 804.324786][ T6432] IPVS: ftp: loaded support on port[0] = 21 01:52:27 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xc003) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 804.668435][ T6461] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 804.922509][ T6436] IPVS: ftp: loaded support on port[0] = 21 01:52:28 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x36c, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xf, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000500004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:28 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:28 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd002) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000004c000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 805.444908][ T6482] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:28 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000600004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 805.586534][ T6493] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 805.599929][ T6488] IPVS: ftp: loaded support on port[0] = 21 01:52:28 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd003) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x10, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:28 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000060000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 805.990497][ T6512] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:29 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x380, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000700004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:29 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:29 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd200) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x11, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000005865000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:29 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 806.602048][ T6535] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000800004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x12, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 806.765374][ T6540] IPVS: ftp: loaded support on port[0] = 21 01:52:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000068000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:29 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd202) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000a00004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 807.034340][ T6558] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 807.152547][ T6567] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:30 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x388, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:30 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:30 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd203) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x13, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff001000004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000006c000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:30 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff004800004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 807.723074][ T6583] IPVS: ftp: loaded support on port[0] = 21 01:52:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x14, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000074000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff004c00004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:30 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:31 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x398, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:31 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xe003) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x28, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff006800004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:31 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000007a000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 808.795491][ T6634] __nla_validate_parse: 4 callbacks suppressed [ 808.795501][ T6634] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff006c00004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:31 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 808.893669][ T6636] IPVS: ftp: loaded support on port[0] = 21 [ 808.926468][ T6641] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x2d, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000057a000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:31 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xe203) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff007400004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 809.283365][ T6657] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 809.416448][ T6665] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:32 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3ae, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:32 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff007a00004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x5f, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:32 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xe602) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000081000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000003004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 809.775749][ T6685] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 809.798086][ T6687] IPVS: ftp: loaded support on port[0] = 21 01:52:32 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 809.869516][ T6694] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x60, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000ffffa888000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00f603004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:32 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xe801) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 810.241393][ T6709] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:33 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3b4, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:33 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000005004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xf0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000ffffff9e000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:33 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xea03) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 810.798981][ T6740] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:33 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000006004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 810.944763][ T6742] IPVS: ftp: loaded support on port[0] = 21 01:52:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x180, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:33 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000ffffffa6000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000007004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 811.232373][ T6766] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:34 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3d0, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:34 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:34 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xec03) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000ec0000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000a004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x300, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000020004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:34 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 811.790253][ T6788] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 811.844097][ T6794] IPVS: ftp: loaded support on port[0] = 21 01:52:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x500, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00003f004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000fffffff0000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:34 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x0, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:35 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3d2, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:35 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xed00) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000040004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x600, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:35 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x0, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000ff000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000048004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:35 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x0, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 812.786988][ T6848] IPVS: ftp: loaded support on port[0] = 21 01:52:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000088a8ffff000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x700, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00004c004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:35 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:36 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3d9, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000068004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:36 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xed01) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x900, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000f0ffff000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:36 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00006c004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:36 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 813.859627][ T6899] IPVS: ftp: loaded support on port[0] = 21 01:52:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xa00, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300007fffffff000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:36 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xee03) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 814.133382][ T6917] __nla_validate_parse: 6 callbacks suppressed [ 814.133393][ T6917] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000074004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:37 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3e0, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:37 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) 01:52:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xb00, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300009effffff000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00007a004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:37 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf403) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 814.863407][ T6941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:37 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) 01:52:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0003f6004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 815.000527][ T6950] IPVS: ftp: loaded support on port[0] = 21 01:52:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xb2b, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000a6ffffff000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000ff004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:37 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf500) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 815.302981][ T6970] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 815.446279][ T6980] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:38 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3ec, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:38 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) 01:52:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00ffffff8500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000f0ffffff000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xe00, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:38 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf603) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 816.065994][ T6996] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00ffffff9500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:38 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, 0x0, 0x0) [ 816.187725][ T7002] IPVS: ftp: loaded support on port[0] = 21 01:52:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xf00, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000000000001b0000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000002004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:39 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, 0x0, 0x0) [ 816.566149][ T7024] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:39 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3ee, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:39 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf803) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x1100, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000003004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:39 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, 0x0, 0x0) 01:52:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000020000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 817.246093][ T7047] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000004004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:40 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 817.332780][ T7051] IPVS: ftp: loaded support on port[0] = 21 01:52:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000030000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x1200, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000005004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:40 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) [ 817.657254][ T7068] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:41 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3f0, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000006004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:41 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfa03) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x1300, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000040000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) chdir(&(0x7f0000000080)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 818.375878][ T7096] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000007004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:41 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfc01) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 818.497414][ T7102] overlayfs: failed to resolve 'file0': -2 [ 818.506853][ T7113] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 818.520482][ T7108] IPVS: ftp: loaded support on port[0] = 21 01:52:41 executing program 2: 01:52:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x1400, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000008004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000050000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:42 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3f6, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000a004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:42 executing program 2: 01:52:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfc03) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x2800, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000060000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 819.401437][ T7148] __nla_validate_parse: 2 callbacks suppressed [ 819.401448][ T7148] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:42 executing program 2: 01:52:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000010004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 819.479063][ T7154] IPVS: ftp: loaded support on port[0] = 21 01:52:42 executing program 2: 01:52:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfd03) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x2b0b, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000070000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 819.901953][ T7177] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:43 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3f8, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:43 executing program 2: 01:52:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000048004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:43 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfe03) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x2d00, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000080000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 820.402912][ T7199] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000060000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00004c004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 820.503646][ T7204] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 820.562197][ T7203] IPVS: ftp: loaded support on port[0] = 21 01:52:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x3f00, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 820.647192][ T7215] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 01:52:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000090000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:43 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfeff) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000068004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 820.954078][ T7226] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 821.078312][ T7236] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:44 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3fa, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:44 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xe003) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x4000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00006c004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000a0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:44 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xff00) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 821.620060][ T7254] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000074004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x5f00, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 821.772010][ T7257] IPVS: ftp: loaded support on port[0] = 21 01:52:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000b0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:44 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xff01) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:44 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd200) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00007a004500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 821.980032][ T7273] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:45 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3fc, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x6000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000c0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000034500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:45 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfffe) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:45 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd200) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 822.705345][ T7299] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000f6034500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 822.831825][ T7307] IPVS: ftp: loaded support on port[0] = 21 01:52:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xf000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000d0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:45 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xc003) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:45 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x40000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000054500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:46 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3fd, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x20000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000e0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:46 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000064500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:46 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x35a, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000074500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 823.861656][ T7354] IPVS: ftp: loaded support on port[0] = 21 01:52:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000f0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 823.984350][ T7360] IPVS: ftp: loaded support on port[0] = 21 01:52:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x34000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:46 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000a4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x400300, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:47 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3fe, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000204500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000100000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xf0ffff, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:47 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:47 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 825.091679][ T7413] __nla_validate_parse: 5 callbacks suppressed [ 825.091689][ T7413] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000003f4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 825.156392][ T7414] IPVS: ftp: loaded support on port[0] = 21 01:52:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x1000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:48 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2040000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 825.353968][ T7423] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000404500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:48 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xb603) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000480000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 825.765084][ T7445] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x1800000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000484500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:48 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x9a02) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:48 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:48 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x600, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000004c0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 826.177455][ T7467] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000004c4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 826.296649][ T7473] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x2000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 826.371990][ T7471] IPVS: ftp: loaded support on port[0] = 21 01:52:49 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x310, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000684500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000600000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 826.688950][ T7488] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:49 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000006c4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 826.735206][ T7493] IPVS: ftp: loaded support on port[0] = 21 01:52:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x3000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000680000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000744500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 827.209056][ T7509] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 827.281141][ T7519] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:50 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xc00, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x4000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000007a4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:50 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x5000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 827.813299][ T7541] IPVS: ftp: loaded support on port[0] = 21 01:52:50 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000006c0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000003f64500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:50 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x6000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x5000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000ff4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 828.171173][ T7554] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:50 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x7000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x6000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:51 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xc02, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000740000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000000500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x7000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:51 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x8003) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:51 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x8000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 828.845057][ T7594] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000001800000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x8000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000007a0000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 829.032131][ T7603] IPVS: ftp: loaded support on port[0] = 21 01:52:51 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xa000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:51 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x5a03) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000024500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:52 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1003, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x9000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000034500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000f00000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:52 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xa010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:52 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x360d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000044500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 830.115037][ T7641] __nla_validate_parse: 2 callbacks suppressed [ 830.115047][ T7641] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 830.197934][ T7650] IPVS: ftp: loaded support on port[0] = 21 01:52:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xa000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:53 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xc030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000300000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:53 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x360d) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000054500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 830.583969][ T7673] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:53 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1100, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xb000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:53 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000064500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000500000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:53 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 831.230720][ T7695] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000074500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 831.357456][ T7704] IPVS: ftp: loaded support on port[0] = 21 01:52:54 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xe000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000007a0500000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000084500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:54 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 831.729036][ T7728] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:55 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1200, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:55 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x10000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xf000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000a4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000600000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:55 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) [ 832.361227][ T7749] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000104500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 832.456514][ T7762] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 832.490322][ T7763] IPVS: ftp: loaded support on port[0] = 21 01:52:55 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x10010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x10000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000700000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000484500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 832.832488][ T7782] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x11000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 832.897682][ T7785] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:56 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1601, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:56 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x10030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000900000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000004c4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x12000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:56 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) [ 833.518774][ T7814] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000684500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x13000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 833.601828][ T7818] IPVS: ftp: loaded support on port[0] = 21 01:52:56 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x100d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000a00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000006c4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 833.916670][ T7838] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x14000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:57 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1801, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:57 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x110d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000744500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:57 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) 01:52:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000b00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x28000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000007a4500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x2b0b0000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 834.766238][ T7874] IPVS: ftp: loaded support on port[0] = 21 01:52:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000c00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:57 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x120d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000000500000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x2d000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:58 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x1d00, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000d00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000001000000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x3f000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:58 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x130d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:58 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 835.697821][ T7920] __nla_validate_parse: 4 callbacks suppressed [ 835.697830][ T7920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000001800000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 835.829121][ T7929] IPVS: ftp: loaded support on port[0] = 21 01:52:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000e00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:58 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x40000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000085ffffff00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 836.171679][ T7946] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:58 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 836.384976][ T7954] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:59 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x2602, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:52:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000095ffffff00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x5f000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:59 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x140d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000c00e00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:52:59 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:52:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000000100000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 836.788412][ T7981] IPVS: ftp: loaded support on port[0] = 21 [ 836.814976][ T7975] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:59 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 836.957846][ T7994] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:52:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x60000000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:52:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004502000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:52:59 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x150d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:52:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000f00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 837.342830][ T8016] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:00 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x2802, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:00 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x9effffff, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:00 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x160d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004503000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000002000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 837.792409][ T8035] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004504000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 837.891655][ T8039] IPVS: ftp: loaded support on port[0] = 21 01:53:00 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000003f00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xf0ffffff, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:00 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x170d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004505000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 838.151428][ T8056] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 838.343100][ T8067] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:01 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x2c00, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004506000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000004000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xffff0000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:01 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x180d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 839.014648][ T8090] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004507000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 839.146815][ T8099] IPVS: ftp: loaded support on port[0] = 21 01:53:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xfffff000, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:01 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x19030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000004800000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:02 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102201fd1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:02 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x2e01, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004508000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xffffff7f, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:02 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000004c00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:02 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x190d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450a000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:02 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:02 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1a000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xffffff9e, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 840.221322][ T8155] IPVS: ftp: loaded support on port[0] = 21 01:53:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000655800000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004510000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:03 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3001, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:03 executing program 2: r0 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:03 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1a0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000006000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xfffffff0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004548000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 841.199765][ T8192] __nla_validate_parse: 7 callbacks suppressed [ 841.199775][ T8192] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000454c000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 841.266739][ T8201] IPVS: ftp: loaded support on port[0] = 21 01:53:04 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1b0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:04 executing program 2: r0 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0xffffffff, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000586500000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004568000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 841.667647][ T8222] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:04 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3701, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:04 executing program 2: r0 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000456c000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000006800000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:04 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1c000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 842.099813][ T8245] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004574000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:04 executing program 2: write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) [ 842.230981][ T8251] IPVS: ftp: loaded support on port[0] = 21 [ 842.246773][ T8257] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x2, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:05 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1c0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000457a000000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000006c00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 842.630096][ T8275] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 842.729334][ T8284] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:05 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3a00, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:05 executing program 2: write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) 01:53:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500030000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:05 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1d0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x3, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000007400000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045f6030000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:05 executing program 2: write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) [ 843.241979][ T8302] IPVS: ftp: loaded support on port[0] = 21 [ 843.249853][ T8295] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x4, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:06 executing program 2: r0 = socket(0x0, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500050000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:06 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1e0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:06 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3e01, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000007a00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:06 executing program 2: r0 = socket(0x0, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500060000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x5, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:06 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1f0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 844.165059][ T8349] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500070000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:06 executing program 2: r0 = socket(0x0, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 844.230159][ T8358] IPVS: ftp: loaded support on port[0] = 21 01:53:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045000a0000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 844.305002][ T8365] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x6, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:07 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x200d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000057a00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 844.659066][ T8386] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:07 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x3e03, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:07 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x7, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500200000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:07 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x210d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000008100000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:08 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045003f0000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000ec000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 845.434492][ T8413] IPVS: ftp: loaded support on port[0] = 21 01:53:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x8, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:08 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x220d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500400000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:09 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x4000, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:09 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500480000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x9, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000f000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:09 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x230d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 846.496096][ T8459] __nla_validate_parse: 5 callbacks suppressed [ 846.496105][ T8459] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:09 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045004c0000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 846.606282][ T8468] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 846.648102][ T8464] IPVS: ftp: loaded support on port[0] = 21 01:53:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xa, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000ff00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:09 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x240d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500680000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 846.983452][ T8479] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:10 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x4202, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:10 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045006c0000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xb, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:10 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x250d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000004003000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:10 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 847.743759][ T8510] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 847.814895][ T8516] IPVS: ftp: loaded support on port[0] = 21 01:53:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500740000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xe, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 847.934764][ T8524] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:10 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000340000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045007a0000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 848.290986][ T8543] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:11 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:11 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x26020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xf, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004503f60000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:11 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x4c00, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000fffff0000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 848.804972][ T8561] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:11 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500ff0000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 848.916882][ T8571] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 848.920474][ T8569] IPVS: ftp: loaded support on port[0] = 21 01:53:11 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x260d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x10, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500002000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:11 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0), 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000010007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000001000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:12 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0), 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 849.318134][ T8596] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:12 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x270d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:12 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x5a01, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x11, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000020007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000002000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:12 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0), 0x0) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:12 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x280d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 850.170380][ T8622] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000003000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:13 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600", 0x17) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 850.328538][ T8635] IPVS: ftp: loaded support on port[0] = 21 01:53:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000030007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x12, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000004000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:13 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x290d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:13 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600", 0x17) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000040007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000005000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x13, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:13 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x5a03, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:13 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2a000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:13 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600", 0x17) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000006000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x14, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000050007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 851.408249][ T8689] IPVS: ftp: loaded support on port[0] = 21 01:53:14 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f93360", 0x23) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000007000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:14 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2a0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 851.690675][ T8707] __nla_validate_parse: 3 callbacks suppressed [ 851.690684][ T8707] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x28, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000008000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:14 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f93360", 0x23) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:15 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x6001, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000060007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000000a000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:15 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f93360", 0x23) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:15 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2b0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x2d, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 852.475265][ T8744] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:15 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878", 0x29) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000010000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 852.520368][ T8755] IPVS: ftp: loaded support on port[0] = 21 01:53:15 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2c0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000070007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x5f, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:15 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878", 0x29) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 852.870975][ T8776] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 853.030845][ T8788] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:16 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x6002, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000003f000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x60, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:16 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2d0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878", 0x29) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000080007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 853.567796][ T8806] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c", 0x2c) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000040000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xf0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 853.711953][ T8809] IPVS: ftp: loaded support on port[0] = 21 01:53:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000090007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c", 0x2c) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000048000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 854.028961][ T8829] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 854.195244][ T8838] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:17 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x6200, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:17 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2e0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000004c000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x180, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c", 0x2c) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000000a0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 854.777396][ T8856] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000068000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 854.854649][ T8864] IPVS: ftp: loaded support on port[0] = 21 [ 854.862131][ T8865] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b", 0x2d) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:17 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2f0d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x300, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000000b0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000006c000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 855.258274][ T8892] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:18 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x6403, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:18 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b", 0x2d) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000074000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x500, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:18 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x30000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000000c0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:18 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b", 0x2d) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 855.937431][ T8915] IPVS: ftp: loaded support on port[0] = 21 01:53:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000007a000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000000d0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x600, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:18 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045000003f6000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:19 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:19 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x6801, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045000000ff000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:19 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x300d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x700, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000000e0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 857.096993][ T8964] __nla_validate_parse: 4 callbacks suppressed [ 857.097002][ T8964] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500020000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:20 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 857.261214][ T8973] IPVS: ftp: loaded support on port[0] = 21 01:53:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000000f0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x900, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:20 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:20 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x310d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500030000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 857.616863][ T8995] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 857.782557][ T9017] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:20 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x6c03, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:20 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500040000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xa00, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:20 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x320d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000100007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 858.163896][ T9036] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500050000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:21 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 858.257402][ T9065] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:21 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x33000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 858.301369][ T9066] IPVS: ftp: loaded support on port[0] = 21 01:53:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000200007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500060000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xb00, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 858.629741][ T9088] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:21 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x7201, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:21 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500070000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:21 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x330d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xb2b, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000003f0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500080000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 859.202820][ T9109] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 859.226023][ T9117] IPVS: ftp: loaded support on port[0] = 21 01:53:22 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 859.298000][ T9122] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xe00, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000400007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045000a0000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:22 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 859.621330][ T9141] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 859.715166][ T9147] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:22 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x7c00, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:22 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x340d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500100000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xf00, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:22 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000480007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500480000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:23 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 860.318692][ T9171] IPVS: ftp: loaded support on port[0] = 21 01:53:23 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x350d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000004c0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x1100, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045004c0000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:24 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x8003, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:24 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000600007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500680000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x1200, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:24 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x360d0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:24 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x0, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045006c0000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 861.493581][ T9220] IPVS: ftp: loaded support on port[0] = 21 01:53:24 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3c010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000058650007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x1300, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500740000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:25 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x8401, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:25 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x0, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x1400, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045007a0000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000680007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:25 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3e000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 862.456145][ T9268] __nla_validate_parse: 6 callbacks suppressed [ 862.456154][ T9268] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000300000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:25 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x0, 0x2}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 862.576702][ T9281] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 862.590917][ T9280] IPVS: ftp: loaded support on port[0] = 21 01:53:25 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3e010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000006c0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x2800, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500f60300000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 863.014427][ T9300] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 863.187353][ T9310] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:26 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x8800, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:26 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000500000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:26 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3f000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x2b0b, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000740007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000600000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:26 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003}) read(r0, &(0x7f0000000180)=""/178, 0xb2) [ 863.623565][ T9325] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 863.750225][ T9328] IPVS: ftp: loaded support on port[0] = 21 [ 863.796541][ T9338] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:26 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003}) read(r0, &(0x7f0000000180)=""/178, 0xb2) 01:53:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000700000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:26 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x40000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x2d00, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:27 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x8803, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000007a0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000a00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:27 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) 01:53:27 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x40020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x3f00, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 864.555857][ T9373] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500002000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 864.697490][ T9383] IPVS: ftp: loaded support on port[0] = 21 01:53:27 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x42020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x4000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000000000057a0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500003f00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 864.990240][ T9403] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x5f00, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:28 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x9800, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500004000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:28 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x42030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000810007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x6000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:28 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) [ 865.547457][ T9430] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:28 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4c000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500004800000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 865.655301][ T9438] IPVS: ftp: loaded support on port[0] = 21 01:53:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500004c00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000ffffa8880007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xf000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 865.886619][ T9455] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500006800000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x20000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:29 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4c020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500006c00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000ffffff9e0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:29 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x9803, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:29 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(0xffffffffffffffff, &(0x7f0000000180)=""/178, 0xb2) 01:53:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500007400000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000ffffffa60007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:29 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4c030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x34000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500007a00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 866.752989][ T9490] IPVS: ftp: loaded support on port[0] = 21 01:53:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000ec00007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450003f600000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x400300, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000ff00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000020000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:30 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x9a00, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:30 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, 0x0, 0x0) 01:53:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000fffffff00007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xf0ffff, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:30 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4e000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000010000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000020000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 867.945824][ T9556] __nla_validate_parse: 4 callbacks suppressed [ 867.945834][ T9556] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 868.055811][ T9559] IPVS: ftp: loaded support on port[0] = 21 01:53:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x1000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000000ff0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000030000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:30 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x50030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000040000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 868.426312][ T9580] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 868.515009][ T9585] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:31 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xa600, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x1800000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000050000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000088a8ffff0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:31 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, 0x0, 0x0) 01:53:31 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x54020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 869.188071][ T9606] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000060000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 869.266379][ T9613] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x2000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000f0ffff0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 869.363729][ T9615] IPVS: ftp: loaded support on port[0] = 21 01:53:32 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x5a030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000070000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 869.518426][ T9630] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x3000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 869.636098][ T9633] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:32 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xaa01, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000007fffffff0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000080000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:32 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x72010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x4000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:32 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f00000000c0), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) read(r0, 0x0, 0x0) [ 870.256372][ T9657] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045000000000a0000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 870.362610][ T9668] IPVS: ftp: loaded support on port[0] = 21 [ 870.387250][ T9674] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x5000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000100000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e0003030000009effffff0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:33 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x78010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 870.752910][ T9688] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x6000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:34 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xae03, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045000000003f0000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000a6ffffff0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:34 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x7c030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:34 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000040)=ANY=[@ANYRES64=r0, @ANYBLOB="7fffffff09aef927030000e2", @ANYRESHEX, @ANYRESOCT, @ANYRESDEC]) 01:53:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x7000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000400000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 871.592109][ T9729] IPVS: ftp: loaded support on port[0] = 21 01:53:34 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x410081, 0x0) r1 = socket$inet6(0xa, 0x82006, 0x800000000000004) ioctl(r1, 0x0, &(0x7f00000000c0)="15bf6234488dd25d726070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0xc9e, @mcast1}, 0x1c) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x4200, 0x0) r4 = dup(r0) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0x8000000000000ff, 0x400001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x388000, @local, 0x4}, 0x1c) dup2(r5, r6) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000880)={{{@in=@local, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000340)=0xfffffd70) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in=@multicast1, @in6=@local}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xffffffffffffff22) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x8000000000000002, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000280)={[], 0x1, 0x1, 0x7, 0x7ff, 0x5, r8}) sync_file_range(r3, 0x7, 0x1, 0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000480)={@dev={0xfe, 0x80, [], 0xb}, 0x81}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000240)=0x0) fcntl$getown(r1, 0x9) getpgrp(r9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x4, 0x2, 0x1, 0xd, 0x5, 0x6}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) getsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000180), &(0x7f0000000380)=0x4) r10 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) getegid() getresgid(0x0, 0x0, 0x0) setfsgid(0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) ioctl$BLKTRACESTART(r10, 0x1274, 0x0) ioctl$BLKTRACESTOP(r10, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r10, 0x1276, 0x0) 01:53:34 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x80030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000f0ffffff0007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x8000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000480000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 872.099507][ T9740] relay: one or more items not logged [item size (56) > sub-buffer size (9)] 01:53:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x9000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000200000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:35 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x80040000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045000000004c0000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:35 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xb403, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:35 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x410081, 0x0) r1 = socket$inet6(0xa, 0x82006, 0x800000000000004) ioctl(r1, 0x0, &(0x7f00000000c0)="15bf6234488dd25d726070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0xc9e, @mcast1}, 0x1c) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x4200, 0x0) r4 = dup(r0) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0x8000000000000ff, 0x400001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x388000, @local, 0x4}, 0x1c) dup2(r5, r6) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000880)={{{@in=@local, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000340)=0xfffffd70) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in=@multicast1, @in6=@local}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xffffffffffffff22) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x8000000000000002, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000280)={[], 0x1, 0x1, 0x7, 0x7ff, 0x5, r8}) sync_file_range(r3, 0x7, 0x1, 0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000480)={@dev={0xfe, 0x80, [], 0xb}, 0x81}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000240)=0x0) fcntl$getown(r1, 0x9) getpgrp(r9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x4, 0x2, 0x1, 0xd, 0x5, 0x6}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) getsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000180), &(0x7f0000000380)=0x4) r10 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) getegid() getresgid(0x0, 0x0, 0x0) setfsgid(0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) ioctl$BLKTRACESTART(r10, 0x1274, 0x0) ioctl$BLKTRACESTOP(r10, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r10, 0x1276, 0x0) 01:53:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000680000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:35 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x84000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 872.695949][ T9788] IPVS: ftp: loaded support on port[0] = 21 01:53:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000300000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xa000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045000000006c0000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:35 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x410081, 0x0) r1 = socket$inet6(0xa, 0x82006, 0x800000000000004) ioctl(r1, 0x0, &(0x7f00000000c0)="15bf6234488dd25d726070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0xc9e, @mcast1}, 0x1c) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x4200, 0x0) r4 = dup(r0) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0x8000000000000ff, 0x400001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x388000, @local, 0x4}, 0x1c) dup2(r5, r6) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000880)={{{@in=@local, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000340)=0xfffffd70) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in=@multicast1, @in6=@local}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xffffffffffffff22) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x8000000000000002, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000280)={[], 0x1, 0x1, 0x7, 0x7ff, 0x5, r8}) sync_file_range(r3, 0x7, 0x1, 0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000480)={@dev={0xfe, 0x80, [], 0xb}, 0x81}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000240)=0x0) fcntl$getown(r1, 0x9) getpgrp(r9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x4, 0x2, 0x1, 0xd, 0x5, 0x6}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) getsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000180), &(0x7f0000000380)=0x4) r10 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) getegid() getresgid(0x0, 0x0, 0x0) setfsgid(0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) ioctl$BLKTRACESTART(r10, 0x1274, 0x0) ioctl$BLKTRACESTOP(r10, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r10, 0x1276, 0x0) [ 873.008926][ T9802] __nla_validate_parse: 4 callbacks suppressed [ 873.008935][ T9802] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xb000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:35 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x8cffffff) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000740000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000400000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 873.382626][ T9821] debugfs: File 'dropped' in directory 'loop0' already present! [ 873.398700][ T9821] debugfs: File 'msg' in directory 'loop0' already present! [ 873.409983][ T9834] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 873.508626][ T9821] debugfs: File 'trace0' in directory 'loop0' already present! [ 873.575216][ T9842] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:36 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xba01, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:36 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x9a020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xe000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045000000007a0000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000500000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:36 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x410081, 0x0) r1 = socket$inet6(0xa, 0x82006, 0x800000000000004) ioctl(r1, 0x0, &(0x7f00000000c0)="15bf6234488dd25d726070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0xc9e, @mcast1}, 0x1c) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x4200, 0x0) r4 = dup(r0) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0x8000000000000ff, 0x400001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x388000, @local, 0x4}, 0x1c) dup2(r5, r6) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000880)={{{@in=@local, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000340)=0xfffffd70) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in=@multicast1, @in6=@local}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xffffffffffffff22) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x8000000000000002, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000280)={[], 0x1, 0x1, 0x7, 0x7ff, 0x5, r8}) sync_file_range(r3, 0x7, 0x1, 0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000480)={@dev={0xfe, 0x80, [], 0xb}, 0x81}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000240)=0x0) fcntl$getown(r1, 0x9) getpgrp(r9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x4, 0x2, 0x1, 0xd, 0x5, 0x6}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) getsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000180), &(0x7f0000000380)=0x4) r10 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) getegid() getresgid(0x0, 0x0, 0x0) setfsgid(0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) ioctl$BLKTRACESTART(r10, 0x1274, 0x0) ioctl$BLKTRACESTOP(r10, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r10, 0x1276, 0x0) [ 873.920351][ T9854] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000003f60000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 874.012131][ T9862] IPVS: ftp: loaded support on port[0] = 21 [ 874.024625][ T9866] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 874.081314][ T9855] debugfs: File 'dropped' in directory 'loop0' already present! 01:53:36 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xa0020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xf000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000600000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 874.124008][ T9855] debugfs: File 'msg' in directory 'loop0' already present! [ 874.135834][ T9855] debugfs: File 'trace0' in directory 'loop0' already present! 01:53:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000ff0000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 874.340566][ T9883] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x10000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 874.575310][ T9894] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:37 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xbc01, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:37 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x410081, 0x0) r1 = socket$inet6(0xa, 0x82006, 0x800000000000004) ioctl(r1, 0x0, &(0x7f00000000c0)="15bf6234488dd25d726070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0xc9e, @mcast1}, 0x1c) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x4200, 0x0) r4 = dup(r0) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0x8000000000000ff, 0x400001}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x388000, @local, 0x4}, 0x1c) dup2(r5, r6) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000880)={{{@in=@local, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000340)=0xfffffd70) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in=@multicast1, @in6=@local}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xffffffffffffff22) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x8000000000000002, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000280)={[], 0x1, 0x1, 0x7, 0x7ff, 0x5, r8}) sync_file_range(r3, 0x7, 0x1, 0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000480)={@dev={0xfe, 0x80, [], 0xb}, 0x81}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000240)=0x0) fcntl$getown(r1, 0x9) getpgrp(r9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x4, 0x2, 0x1, 0xd, 0x5, 0x6}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) getsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000180), &(0x7f0000000380)=0x4) r10 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) getegid() getresgid(0x0, 0x0, 0x0) setfsgid(0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) ioctl$BLKTRACESTART(r10, 0x1274, 0x0) ioctl$BLKTRACESTOP(r10, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r10, 0x1276, 0x0) 01:53:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000200000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:37 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xb6030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000700000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x11000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000300000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 875.048288][ T9911] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 875.106093][ T9921] IPVS: ftp: loaded support on port[0] = 21 [ 875.117310][ T9925] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:37 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xc0010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x12000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 875.164429][ T9928] debugfs: File 'dropped' in directory 'loop0' already present! [ 875.199952][ T9928] debugfs: File 'msg' in directory 'loop0' already present! [ 875.284410][ T9928] debugfs: File 'trace0' in directory 'loop0' already present! 01:53:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000800000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000400000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 875.532157][ T9945] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000500000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:38 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xbe01, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:38 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000040)=ANY=[@ANYRES64=r0, @ANYBLOB="7fffffff09aef927030000e2bf", @ANYRESHEX, @ANYRESOCT, @ANYRESDEC]) 01:53:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000900000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x13000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000600000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:38 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xc0030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000700000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000800000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 876.311835][ T9983] IPVS: ftp: loaded support on port[0] = 21 01:53:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000a00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x14000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:39 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd0020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:39 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local, @random="192bce5e2ffb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:53:39 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xc002, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000a00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) setregid(0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="ae", 0x1}], 0x1) 01:53:39 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd0030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x28000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000b00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 877.271899][T10021] sg_write: process 1839 (syz-executor.2) changed security contexts after opening file descriptor, this is not allowed. 01:53:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500001000000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) [ 877.413844][T10033] IPVS: ftp: loaded support on port[0] = 21 01:53:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x2b0b0000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000c00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500004800000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:40 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd2000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:41 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xc401, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500004c00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000d00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x2d000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 01:53:41 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd2020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 878.480538][T10081] __nla_validate_parse: 7 callbacks suppressed [ 878.480547][T10081] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500006800000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 878.605137][T10087] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:41 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd2030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x3f000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 878.676632][T10088] IPVS: ftp: loaded support on port[0] = 21 01:53:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000e00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500006c00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 879.017286][T10103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500007400000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:42 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xc801, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xe0030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:42 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd2030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x40000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000f00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500007a00000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 879.716701][T10126] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000003000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 879.821048][T10139] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 879.879808][T10140] IPVS: ftp: loaded support on port[0] = 21 01:53:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xe2030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000001000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x5f000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:42 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xbc01, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000f603000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 880.277332][T10154] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 880.328597][T10162] IPVS: ftp: loaded support on port[0] = 21 01:53:43 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xca00, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x60000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000005000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000004800000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:43 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xe4ffffff) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:43 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xc0010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 880.910140][T10182] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000006000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 881.030497][T10189] IPVS: ftp: loaded support on port[0] = 21 01:53:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x9effffff, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:43 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xe6020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000004c00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000007000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 881.387117][T10209] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x12000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:44 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xd003, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000000a000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000006000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xf0ffffff, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:44 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xe8010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xe000000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 882.185983][T10246] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000020000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 882.242718][T10251] IPVS: ftp: loaded support on port[0] = 21 01:53:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xffff0000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) [ 882.316016][T10253] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xf0ffffff, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000006800000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:45 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xea030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000003f000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:45 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xd200, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xfffff000, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000006c00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:45 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xca00, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000040000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:45 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xec030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000048000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 883.371614][T10303] IPVS: ftp: loaded support on port[0] = 21 01:53:46 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xed000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 883.429178][T10307] IPVS: ftp: loaded support on port[0] = 21 01:53:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000007400000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xffffff7f, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000004c000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 883.664943][T10321] __nla_validate_parse: 3 callbacks suppressed [ 883.664952][T10321] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000068000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 883.882951][T10333] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:47 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xd201, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:47 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xed010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xffffff9e, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000006c000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000007a00000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:47 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x80030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 884.640980][T10351] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000074000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 884.786368][T10363] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 884.808268][T10360] IPVS: ftp: loaded support on port[0] = 21 01:53:47 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xee030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:47 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x80030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000f000000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xfffffff0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff00000000450000007a000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 885.243654][T10384] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:48 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xd202, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0xffffffff, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045000003f6000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:48 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x78010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000003000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:48 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf4030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 885.918169][T10408] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff0000000045000000ff000000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 886.008680][T10414] IPVS: ftp: loaded support on port[0] = 21 [ 886.036888][T10415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:48 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xee030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000005000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000200000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:49 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf5000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 886.447592][T10434] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 886.616907][T10441] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:49 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xd203, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000100950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0x2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:49 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xee030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000007a05000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:49 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf6030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000200950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 887.121401][T10462] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 887.183584][T10464] IPVS: ftp: loaded support on port[0] = 21 01:53:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000300950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:50 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf6ffffff) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0x3}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000006000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:50 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xee030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:50 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xd402, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0x4}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000400950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000007000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:50 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xd202, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:50 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf8030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000500950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 888.272072][T10509] IPVS: ftp: loaded support on port[0] = 21 [ 888.384010][T10521] IPVS: ftp: loaded support on port[0] = 21 01:53:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000009000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0x5}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000600950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 888.682184][T10534] __nla_validate_parse: 3 callbacks suppressed [ 888.682192][T10534] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:51 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfa030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0x6}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:52 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xd903, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000700950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000a000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0x7}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:52 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfc010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:52 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfa030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 889.528913][T10565] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000800950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 889.590067][T10571] IPVS: ftp: loaded support on port[0] = 21 [ 889.627509][T10578] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0x8}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:52 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfc030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000b000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:52 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xd203, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000000a00950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 890.011353][T10599] IPVS: ftp: loaded support on port[0] = 21 [ 890.048075][T10596] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:53 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xda01, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0x9}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000001000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:53 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfd030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000c000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:53 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf6ffffff) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 890.638910][T10619] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000003f00950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 890.730493][T10624] IPVS: ftp: loaded support on port[0] = 21 [ 890.738344][T10626] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0xa}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000d000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000004000950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:53 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfe030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:53 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfd030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 891.164907][T10644] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 891.247640][T10655] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:54 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xdc00, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0xb}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000e000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000004800950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:54 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfeff0000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:54 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x54020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 891.886141][T10675] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 01:53:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000004c00950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 891.992373][T10681] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 892.006304][T10679] IPVS: ftp: loaded support on port[0] = 21 01:53:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0xe}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000c00e000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:54 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x54020000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000006800950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:55 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfeffffff) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:55 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0xdc02, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 01:53:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0xf}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300000000000f000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) 01:53:55 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x50030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000006c00950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:55 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xff000000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000007400950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 01:53:56 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xff010000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e000303000000000020000007000000", @ANYRES32=0x0, @ANYBLOB="001000000000ffffffff000000000000"], 0x28}}, 0x0) [ 893.376991][T10732] IPVS: ftp: loaded support on port[0] = 21 01:53:56 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setuid(0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x50030000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x35a}, 0xfffffff4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:53:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@rand_addr=0x10}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x6c}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 01:53:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000832ff2e4bd11feff000000004500000000007a00950000000000000048a59b6da5c17fc007844b241eb1fac29dd2551f8a818a80e249396dfb5dc6c98c67359e2fdac731764f7e019689ebe6d7bf196c9f49d9b20e6ba2d1473700478ef0287755fae2eb1d4a03226602d227faac2de508093b72570caf0c226e839bbc0d45ef1092c93ec69576d306d3eb599ee73e8a111cd024609ff9c21f88c9eca26312c04421054f727f18d6dc7c6396a15efd76911ade9368650d85aad419ff1f8bfc2c4748786e6e8a2f0aafbbd3b6cacabffb07df99254c8a0e3bd27bc45699a62830a6c32d764c8ca7ec3791bd55bc1fc6bc3f40408ffc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 893.686158][T10748] kasan: CONFIG_KASAN_INLINE enabled [ 893.695270][T10753] __nla_validate_parse: 3 callbacks suppressed [ 893.695278][T10753] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 893.729284][T10748] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 893.774439][T10748] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 893.781415][T10748] CPU: 1 PID: 10748 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 893.789301][T10748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.799365][T10748] RIP: 0010:memcg_flush_percpu_vmstats+0x4ae/0x930 [ 893.805865][T10748] Code: 05 41 89 c0 41 0f b6 04 24 41 38 c7 7c 08 84 c0 0f 85 5d 03 00 00 44 3b 05 e3 d6 12 08 0f 83 e2 00 00 00 4c 89 f0 48 c1 e8 03 <42> 80 3c 28 00 0f 85 91 03 00 00 48 8b 85 10 fe ff ff 48 8b b0 90 [ 893.825460][T10748] RSP: 0018:ffff8880a3c17980 EFLAGS: 00010206 [ 893.826132][T10732] kobject: 'ip6gre0' (00000000d324e1fb): kobject_add_internal: parent: 'net', set: 'devices' [ 893.831520][T10748] RAX: 0000000000000012 RBX: ffff8880a3c17b28 RCX: ffffc9000e853000 [ 893.831528][T10748] RDX: 000000000000eb02 RSI: ffffffff8340ed27 RDI: 0000000000000007 [ 893.831536][T10748] RBP: ffff8880a3c17be0 R08: 0000000000000000 R09: ffffed1010879153 [ 893.831548][T10748] R10: ffffed1010879152 R11: ffff8880843c8a97 R12: fffffbfff138b760 [ 893.842383][T10732] kobject: 'ip6gre0' (00000000d324e1fb): kobject_uevent_env [ 893.849642][T10748] R13: dffffc0000000000 R14: 0000000000000090 R15: 0000000000000007 [ 893.849653][T10748] FS: 00007f2f401dd700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 893.849661][T10748] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 893.849668][T10748] CR2: 0000000000738000 CR3: 000000008d6ff000 CR4: 00000000001406e0 [ 893.849678][T10748] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 893.849690][T10748] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 893.857706][T10732] kobject: 'ip6gre0' (00000000d324e1fb): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 893.865578][T10748] Call Trace: [ 893.865597][T10748] ? save_stack+0x5c/0x90 [ 893.865606][T10748] ? save_stack+0x23/0x90 [ 893.865626][T10748] ? memcg_event_ptable_queue_proc+0x50/0x50 [ 893.873689][T10732] kobject: 'queues' (000000007703ccff): kobject_add_internal: parent: 'ip6gre0', set: '' [ 893.880827][T10748] ? find_held_lock+0x35/0x130 [ 893.880862][T10748] ? radix_tree_lookup+0x30/0x30 [ 893.888865][T10732] kobject: 'queues' (000000007703ccff): kobject_uevent_env [ 893.897701][T10748] ? kfree+0x226/0x2c0 [ 893.897712][T10748] ? kfree+0x226/0x2c0 [ 893.897724][T10748] ? trace_hardirqs_on+0x67/0x240 [ 893.897741][T10748] __mem_cgroup_free+0x1a/0x190 [ 893.904322][T10732] kobject: 'queues' (000000007703ccff): kobject_uevent_env: filter function caused the event to drop! [ 893.912245][T10748] mem_cgroup_css_alloc+0x3a1/0x1ae0 [ 893.912262][T10748] cgroup_apply_control_enable+0x44d/0xc40 [ 893.912281][T10748] cgroup_mkdir+0x899/0x11b0 [ 893.920282][T10732] kobject: 'rx-0' (0000000005631b9b): kobject_add_internal: parent: 'queues', set: 'queues' [ 893.928177][T10748] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 893.928192][T10748] kernfs_iop_mkdir+0x14d/0x1d0 [ 893.928209][T10748] vfs_mkdir+0x42e/0x670 [ 893.938590][T10732] kobject: 'rx-0' (0000000005631b9b): kobject_uevent_env [ 893.941764][T10748] do_mkdirat+0x234/0x2a0 [ 893.941782][T10748] ? __ia32_sys_mknod+0xb0/0xb0 [ 893.946145][T10732] kobject: 'rx-0' (0000000005631b9b): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 893.950383][T10748] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 893.950397][T10748] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.950414][T10748] ? do_syscall_64+0x26/0x760 [ 893.956483][T10732] kobject: 'tx-0' (0000000003f14ec5): kobject_add_internal: parent: 'queues', set: 'queues' [ 893.966659][T10748] ? lockdep_hardirqs_on+0x421/0x5e0 [ 893.966675][T10748] __x64_sys_mkdir+0x5c/0x80 [ 893.966692][T10748] do_syscall_64+0xfa/0x760 [ 893.971579][T10732] kobject: 'tx-0' (0000000003f14ec5): kobject_uevent_env [ 893.976343][T10748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.976353][T10748] RIP: 0033:0x459a59 [ 893.976370][T10748] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 893.983587][T10732] kobject: 'tx-0' (0000000003f14ec5): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 893.987567][T10748] RSP: 002b:00007f2f401dcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 893.987581][T10748] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000459a59 [ 893.987588][T10748] RDX: 0000000000000000 RSI: 00000000ff010000 RDI: 0000000020000180 [ 893.987600][T10748] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 894.010115][ T3888] kobject: 'loop0' (00000000520bbbca): kobject_uevent_env [ 894.012371][T10748] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f401dd6d4 [ 894.019587][ T3888] kobject: 'loop0' (00000000520bbbca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 894.023409][T10748] R13: 00000000004bf275 R14: 00000000004db028 R15: 00000000ffffffff [ 894.023423][T10748] Modules linked in: [ 894.030995][T10748] ---[ end trace 803a9a737f628866 ]--- [ 894.101511][ T3888] kobject: 'loop5' (00000000f369af6a): kobject_uevent_env [ 894.107002][T10748] RIP: 0010:memcg_flush_percpu_vmstats+0x4ae/0x930 [ 894.115217][ T3888] kobject: 'loop5' (00000000f369af6a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 894.117164][T10748] Code: 05 41 89 c0 41 0f b6 04 24 41 38 c7 7c 08 84 c0 0f 85 5d 03 00 00 44 3b 05 e3 d6 12 08 0f 83 e2 00 00 00 4c 89 f0 48 c1 e8 03 <42> 80 3c 28 00 0f 85 91 03 00 00 48 8b 85 10 fe ff ff 48 8b b0 90 [ 894.286809][T10748] RSP: 0018:ffff8880a3c17980 EFLAGS: 00010206 [ 894.294233][T10748] RAX: 0000000000000012 RBX: ffff8880a3c17b28 RCX: ffffc9000e853000 [ 894.306764][T10748] RDX: 000000000000eb02 RSI: ffffffff8340ed27 RDI: 0000000000000007 [ 894.316711][T10748] RBP: ffff8880a3c17be0 R08: 0000000000000000 R09: ffffed1010879153 [ 894.320564][ T3888] kobject: 'loop3' (00000000e5502d0d): kobject_uevent_env [ 894.325945][T10748] R10: ffffed1010879152 R11: ffff8880843c8a97 R12: fffffbfff138b760 [ 894.341724][T10748] R13: dffffc0000000000 R14: 0000000000000090 R15: 0000000000000007 [ 894.344801][ T3888] kobject: 'loop3' (00000000e5502d0d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 894.350653][T10748] FS: 00007f2f401dd700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 894.381684][T10748] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 894.388644][T10748] CR2: 0000001b3102d000 CR3: 000000008d6ff000 CR4: 00000000001406e0 [ 894.396909][T10748] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 894.405273][T10748] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 894.413328][T10748] Kernel panic - not syncing: Fatal exception [ 894.420947][T10748] Kernel Offset: disabled [ 894.425267][T10748] Rebooting in 86400 seconds..