000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x9, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1631.203714][T18342] IPVS: ftp: loaded support on port[0] = 21 [ 1631.317839][T18348] netlink: 'syz-executor.4': attribute type 18 has an invalid length. 08:50:02 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r3], 0x2}}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x2b08000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000005865", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000e0500010006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1631.365304][T18348] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 08:50:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000081", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000f0500010006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x4000000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1631.623975][T18349] netlink: 'syz-executor.4': attribute type 18 has an invalid length. [ 1631.663934][T18349] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 08:50:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000600500010006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:02 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {0x0}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0xa, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff0000000000000000000000f0", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000002500010006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1632.070777][T18369] netlink: 'syz-executor.4': attribute type 18 has an invalid length. [ 1632.130352][T18369] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1632.141848][T18380] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:03 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1420000a77, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r3], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000040", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x6000000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000300010006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1632.335533][T18378] IPVS: ftp: loaded support on port[0] = 21 08:50:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0xb, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1632.454162][T18389] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000003", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x6558000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000800010006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:03 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {0x0}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1632.644309][T18395] netlink: 'syz-executor.4': attribute type 18 has an invalid length. [ 1632.671328][T18395] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1632.770297][T18403] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 08:50:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000002500010006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000ffff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x10, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1633.039166][T18408] IPVS: ftp: loaded support on port[0] = 21 [ 1633.119125][T18415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:04 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1420000a77, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r3], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x8100000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000502000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:04 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1633.465314][T18427] __nla_validate_parse: 2 callbacks suppressed [ 1633.465324][T18427] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000503000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x11, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x88a8ffff00000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1633.740663][T18431] IPVS: ftp: loaded support on port[0] = 21 [ 1633.765002][T18441] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000504000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1633.931900][T18443] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1634.054109][T18451] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:05 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1420000a77, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r3], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x12, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000505000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x9effffff00000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:05 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1634.502952][T18463] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000506000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1634.760819][T18464] validate_nla: 4 callbacks suppressed [ 1634.760896][T18464] netlink: 'syz-executor.4': attribute type 18 has an invalid length. [ 1634.778745][T18464] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1634.785852][T18468] IPVS: ftp: loaded support on port[0] = 21 08:50:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0xf0ffffff00000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1634.876133][T18479] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x13, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000507000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1635.168218][T18489] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1635.344021][T18490] netlink: 'syz-executor.4': attribute type 18 has an invalid length. [ 1635.366200][T18490] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 08:50:06 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:06 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000508000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0xfeff000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1635.555094][T18497] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000509000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x14, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0xff0f000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1635.845921][T18503] IPVS: ftp: loaded support on port[0] = 21 08:50:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000050a000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1636.077744][T18515] netlink: 'syz-executor.4': attribute type 18 has an invalid length. 08:50:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:07 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000050b000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x24, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:07 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {0x0}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0xffffff7f00000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000050c000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1636.657046][T18540] netlink: 'syz-executor.4': attribute type 18 has an invalid length. 08:50:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0xfffffffffffff000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1636.899046][T18543] IPVS: ftp: loaded support on port[0] = 21 08:50:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000050d000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000050e000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:08 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x2}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:08 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {0x0}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000050f000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x38, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000510000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x3}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000511000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x14, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000ffff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1638.055639][T18576] IPVS: ftp: loaded support on port[0] = 21 [ 1638.314441][T18597] netlink: 'syz-executor.4': attribute type 20 has an invalid length. 08:50:09 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x0, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000512000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x4}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000ffff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:09 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {0x0}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x36, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1638.679303][T18609] __nla_validate_parse: 11 callbacks suppressed [ 1638.679313][T18609] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000ffff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000513000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1638.997816][T18626] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1639.029872][T18613] IPVS: ftp: loaded support on port[0] = 21 08:50:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff0000000000000000000088a8", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1639.052480][T10918] tipc: TX() has been purged, node left! [ 1639.071611][T10918] tipc: TX() has been purged, node left! [ 1639.082935][T18612] selinux_netlink_send: 20 callbacks suppressed [ 1639.082950][T18612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18612 comm=syz-executor.1 08:50:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x5}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000514000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x2}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1639.124888][T10918] tipc: TX() has been purged, node left! [ 1639.144389][T10918] tipc: TX() has been purged, node left! [ 1639.195981][T10918] tipc: TX() has been purged, node left! [ 1639.202261][T10918] tipc: TX() has been purged, node left! [ 1639.202546][T18612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18612 comm=syz-executor.1 [ 1639.235078][T10918] tipc: TX() has been purged, node left! [ 1639.242054][T18632] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1639.276144][T18612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18612 comm=syz-executor.1 [ 1639.333050][T10918] tipc: TX() has been purged, node left! [ 1639.362533][T10918] tipc: TX() has been purged, node left! [ 1639.366129][T18612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18612 comm=syz-executor.1 [ 1639.382857][T10918] tipc: TX() has been purged, node left! [ 1639.443976][T18612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18612 comm=syz-executor.1 [ 1639.519009][T18612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18612 comm=syz-executor.1 [ 1639.519151][T10918] tipc: TX() has been purged, node left! [ 1639.566015][T18612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18612 comm=syz-executor.1 [ 1639.581029][T10918] tipc: TX() has been purged, node left! [ 1639.595030][T10918] tipc: TX() has been purged, node left! [ 1639.608278][T10918] tipc: TX() has been purged, node left! [ 1639.616422][T18612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18612 comm=syz-executor.1 [ 1639.631212][T18612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18612 comm=syz-executor.1 [ 1639.696588][T10918] tipc: TX() has been purged, node left! [ 1639.709171][T18612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18612 comm=syz-executor.1 08:50:10 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x0, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff0000000000000000000000f0", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000515000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:10 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x6}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x3}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1639.815712][T10918] tipc: TX() has been purged, node left! [ 1639.838829][T18648] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000516000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000007fff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1639.995784][T10918] tipc: TX() has been purged, node left! 08:50:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x7}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1640.105815][T10918] tipc: TX() has been purged, node left! [ 1640.113461][T10918] tipc: TX() has been purged, node left! 08:50:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000009eff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1640.151413][T18668] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1640.153373][T18654] IPVS: ftp: loaded support on port[0] = 21 08:50:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x5}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1640.204508][T10918] tipc: TX() has been purged, node left! [ 1640.212908][T10918] tipc: TX() has been purged, node left! 08:50:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000517000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1640.260626][T10918] tipc: TX() has been purged, node left! [ 1640.290534][T10918] tipc: TX() has been purged, node left! [ 1640.342790][T10918] tipc: TX() has been purged, node left! [ 1640.353302][T10918] tipc: TX() has been purged, node left! [ 1640.385348][T10918] tipc: TX() has been purged, node left! [ 1640.437393][T18676] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1640.492405][T10918] tipc: TX() has been purged, node left! [ 1640.499891][T10918] tipc: TX() has been purged, node left! [ 1640.705651][T10918] tipc: TX() has been purged, node left! 08:50:11 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x0, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000f0ff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x8}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000518000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x7}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:11 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1640.838830][T18690] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1640.915613][T10918] tipc: TX() has been purged, node left! [ 1640.952521][T10918] tipc: TX() has been purged, node left! 08:50:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000519000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1640.995431][T10918] tipc: TX() has been purged, node left! 08:50:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x9}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1641.055251][T10918] tipc: TX() has been purged, node left! [ 1641.116186][T10918] tipc: TX() has been purged, node left! [ 1641.141076][T10918] tipc: TX() has been purged, node left! 08:50:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x8}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1641.182328][T18709] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1641.184147][T18694] IPVS: ftp: loaded support on port[0] = 21 08:50:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000ffff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xa}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:12 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x0, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000051a000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:12 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xb}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1641.854210][T18731] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000051b000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x10}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xc}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1642.108623][T18735] IPVS: ftp: loaded support on port[0] = 21 [ 1642.180186][T18749] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000051c000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:13 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x0, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000051d000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xe}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x14}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:13 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {0x0}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000051e000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xf}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x3e}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000521000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1643.204328][T18772] IPVS: ftp: loaded support on port[0] = 21 08:50:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:14 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x0, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x398}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000522000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:14 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {0x0}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x10}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1643.886263][T18808] __nla_validate_parse: 5 callbacks suppressed [ 1643.886272][T18808] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000523000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x11}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1644.100818][T18814] selinux_netlink_send: 79 callbacks suppressed [ 1644.100833][T18814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18814 comm=syz-executor.1 08:50:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x3b00}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1644.196664][T18824] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1644.207080][T18812] IPVS: ftp: loaded support on port[0] = 21 08:50:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000524000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1644.454014][T18833] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:15 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:15 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {0x0}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x12}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000525000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x2, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1644.882432][T18846] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1644.920328][T18848] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 08:50:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000526000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x13}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1645.117135][T18854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18854 comm=syz-executor.1 [ 1645.138898][T18849] IPVS: ftp: loaded support on port[0] = 21 [ 1645.159046][T18862] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1645.199770][T18854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18854 comm=syz-executor.1 08:50:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000527000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1645.282243][T18854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18854 comm=syz-executor.1 [ 1645.355839][T18854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18854 comm=syz-executor.1 08:50:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1645.439339][T18854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18854 comm=syz-executor.1 [ 1645.495988][T18870] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1645.523238][T18854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18854 comm=syz-executor.1 [ 1645.598680][T18854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18854 comm=syz-executor.1 [ 1645.668052][T18854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18854 comm=syz-executor.1 [ 1645.730651][T18854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18854 comm=syz-executor.1 08:50:16 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x14}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:16 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000528000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x3, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x60}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1646.142905][T18883] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1646.238575][T18884] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 08:50:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000529000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xf0}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1646.462565][T18901] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000052a000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1646.527025][T18894] IPVS: ftp: loaded support on port[0] = 21 08:50:17 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x4, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:17 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000052b000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x300}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000052c000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x500}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x5, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000052d000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1647.377710][T18930] IPVS: ftp: loaded support on port[0] = 21 08:50:18 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x6, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x600}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000052e000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:18 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000052f000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x700}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x7, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000530000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff0000000000000000000000f0", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1648.230589][T18958] IPVS: ftp: loaded support on port[0] = 21 08:50:19 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000531000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000002", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:19 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {0x0}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x82b}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1648.918115][T18985] __nla_validate_parse: 7 callbacks suppressed [ 1648.918125][T18985] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000532000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000003", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1649.118121][T19004] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x9, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000533000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x900}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000004", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1649.305556][T18999] IPVS: ftp: loaded support on port[0] = 21 [ 1649.373839][T19010] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:20 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000534000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000006", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0xa, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xa00}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:20 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {0x0}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000000a", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1649.889022][T19024] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000535000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1650.026453][T19031] selinux_netlink_send: 66 callbacks suppressed [ 1650.026472][T19031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19031 comm=syz-executor.1 08:50:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000000c", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0xc, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1650.168999][T19042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1650.179147][T19031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19031 comm=syz-executor.1 08:50:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xb00}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1650.237113][T19031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19031 comm=syz-executor.1 [ 1650.281407][T19037] IPVS: ftp: loaded support on port[0] = 21 08:50:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000536000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1650.325941][T19031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19031 comm=syz-executor.1 [ 1650.412597][T19031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19031 comm=syz-executor.1 [ 1650.542520][T19054] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1650.595973][T19031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19031 comm=syz-executor.1 [ 1650.635212][T19031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19031 comm=syz-executor.1 [ 1650.686460][T19031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19031 comm=syz-executor.1 [ 1650.725988][T19031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19031 comm=syz-executor.1 [ 1650.741879][T19031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19031 comm=syz-executor.1 08:50:21 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x0, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000000e", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xc00}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0xe, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:21 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {0x0}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000537000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1650.904694][T19063] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000000f", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000538000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xe00}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x10, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000010", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1651.207174][T19081] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1651.257017][T19067] IPVS: ftp: loaded support on port[0] = 21 08:50:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000539000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1651.529112][T19091] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:22 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x0, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xf00}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000053a000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000060", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1651.953053][T19097] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:24 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x12, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000053b000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff0000000000000000000000f0", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x1100}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:24 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x0, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000053c000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x1200}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1653.991428][T19127] __nla_validate_parse: 1 callbacks suppressed [ 1653.991438][T19127] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x13, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1654.096950][T19122] IPVS: ftp: loaded support on port[0] = 21 08:50:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000053d000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1654.416594][T19136] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:25 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x1c, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x1300}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:25 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000053e000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1654.679936][T19147] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000541000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x32, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x1400}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1654.981119][T19164] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000542000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1655.059090][T19157] IPVS: ftp: loaded support on port[0] = 21 [ 1655.181482][T19169] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1655.221783][T19173] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x5, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x2b08}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000543000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1655.511004][T19181] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:26 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:26 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x7, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000544000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x4000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1655.776622][T19196] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000545000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1655.860979][T19189] IPVS: ftp: loaded support on port[0] = 21 [ 1655.996704][T19195] selinux_netlink_send: 65 callbacks suppressed [ 1655.996719][T19195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19195 comm=syz-executor.1 [ 1656.000621][T19203] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1656.026764][T19195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19195 comm=syz-executor.1 08:50:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000050", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x5865}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1656.089704][T19195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19195 comm=syz-executor.1 08:50:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x6, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1656.133211][T19195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19195 comm=syz-executor.1 [ 1656.153402][T19195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19195 comm=syz-executor.1 08:50:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000546000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1656.185841][T19195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19195 comm=syz-executor.1 08:50:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1656.278234][T19195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19195 comm=syz-executor.1 [ 1656.310288][T19213] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:27 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{0x0}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000547000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1656.406166][T19195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19195 comm=syz-executor.1 [ 1656.469953][T19214] netlink: 'syz-executor.4': attribute type 6 has an invalid length. [ 1656.506265][T19195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19195 comm=syz-executor.1 [ 1656.544031][T19195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19195 comm=syz-executor.1 08:50:27 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000548000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x6000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x8, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000010", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1656.781553][T19224] IPVS: ftp: loaded support on port[0] = 21 08:50:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000549000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x6558}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1657.017790][T19236] netlink: 'syz-executor.4': attribute type 8 has an invalid length. 08:50:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000054a000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000065", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:28 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{0x0}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x9, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1657.439458][T19256] netlink: 'syz-executor.4': attribute type 9 has an invalid length. [ 1657.618202][T19260] IPVS: ftp: loaded support on port[0] = 21 08:50:28 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000054b000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x8100}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0xa, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000058", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000054c000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:28 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{0x0}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xf000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000054d000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0xb, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1658.390591][T19291] IPVS: ftp: loaded support on port[0] = 21 08:50:29 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000054e000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xfeff}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000054f000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x10, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xff0f}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000550000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:29 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000551000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1659.176435][T19316] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1659.193331][T19323] __nla_validate_parse: 9 callbacks suppressed [ 1659.193339][T19323] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1659.376661][T19332] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1659.429288][T19328] IPVS: ftp: loaded support on port[0] = 21 08:50:30 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xfffe}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff0000000000000000000000ff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x11, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000552000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1659.742445][T19343] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1659.758809][T19341] netlink: 'syz-executor.4': attribute type 17 has an invalid length. 08:50:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x34000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:30 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000553000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1659.948600][T19354] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000554000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x12, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1660.212922][T19368] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1660.339111][T19358] IPVS: ftp: loaded support on port[0] = 21 [ 1660.388161][T19370] netlink: 'syz-executor.4': attribute type 18 has an invalid length. [ 1660.482111][T19371] netlink: 'syz-executor.4': attribute type 18 has an invalid length. 08:50:31 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x400300}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000555000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x13, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1660.609742][T19377] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:31 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000556000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1660.833379][T19391] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xf0ffff}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x14, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000557000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1661.081120][T19404] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1661.119426][T19392] IPVS: ftp: loaded support on port[0] = 21 [ 1661.134038][T19403] netlink: 'syz-executor.4': attribute type 20 has an invalid length. 08:50:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000558000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x1000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:32 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x102, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1661.559396][T19416] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000559000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1661.788081][T19425] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1661.800731][T19420] selinux_netlink_send: 80 callbacks suppressed [ 1661.800745][T19420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19420 comm=syz-executor.1 [ 1661.846985][T19420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19420 comm=syz-executor.1 [ 1661.888115][T19420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19420 comm=syz-executor.1 [ 1661.918475][T19420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19420 comm=syz-executor.1 [ 1661.934483][T19420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19420 comm=syz-executor.1 [ 1661.957274][T19420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19420 comm=syz-executor.1 [ 1661.976930][T19420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19420 comm=syz-executor.1 [ 1661.990180][T19420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19420 comm=syz-executor.1 [ 1662.003429][T19420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19420 comm=syz-executor.1 [ 1662.017894][T19420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19420 comm=syz-executor.1 08:50:35 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000055a000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x2000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x0}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:35 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1665.087240][T19434] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x204fdff}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000055b000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1665.477792][T19445] IPVS: ftp: loaded support on port[0] = 21 [ 1665.494482][T19455] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:36 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000055c000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x2]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x3000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:36 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1665.954717][T19466] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000055d000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x4000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1666.271372][T19488] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1666.366761][T19482] IPVS: ftp: loaded support on port[0] = 21 08:50:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000055e000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x3]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:37 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x5000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1666.645528][T19500] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000055f000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000560000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:37 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1666.853227][T19512] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x4]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1667.055713][T19520] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1667.089754][T19510] IPVS: ftp: loaded support on port[0] = 21 [ 1667.092060][T19518] selinux_netlink_send: 36 callbacks suppressed 08:50:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x6000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000561000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1667.092074][T19518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19518 comm=syz-executor.1 [ 1667.206945][T19518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19518 comm=syz-executor.1 [ 1667.235885][T19518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19518 comm=syz-executor.1 08:50:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1667.245328][T19528] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1667.275995][T19518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19518 comm=syz-executor.1 [ 1667.337905][T19518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19518 comm=syz-executor.1 08:50:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000562000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1667.480679][T19518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19518 comm=syz-executor.1 [ 1667.556316][T19518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19518 comm=syz-executor.1 [ 1667.586567][T19537] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:38 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x0, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x7000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1667.606338][T19518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19518 comm=syz-executor.1 08:50:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x5]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff0000000000000000000000ff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000563000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1667.647820][T19518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19518 comm=syz-executor.1 [ 1667.676836][T19518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19518 comm=syz-executor.1 [ 1667.728915][T19545] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:38 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff0000000000000000000000ff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000564000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x8000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1667.986561][T19550] IPVS: ftp: loaded support on port[0] = 21 08:50:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff0000000000000000000000ff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000565000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x6]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:39 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x0, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff000000000000000000000088", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000566000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x9000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000567000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1668.791248][T19584] IPVS: ftp: loaded support on port[0] = 21 08:50:39 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000568000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xa000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x7]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000569000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xb000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:40 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x0, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x280082, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000056a000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x8]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000007f", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xc000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:40 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00000000000000000000009e", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000056b000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xe000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x9]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1669.841152][T19625] IPVS: ftp: loaded support on port[0] = 21 08:50:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000056c000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff0000000000000000000000f0", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:41 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000056d000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xf000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0xa]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1670.407523][T19656] __nla_validate_parse: 9 callbacks suppressed [ 1670.407532][T19656] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:41 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff0000000000000000000000ff", @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000056e000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x10000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0xb]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1670.792821][T19665] IPVS: ftp: loaded support on port[0] = 21 08:50:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1670.899710][T19675] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000056f000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1671.156351][T19687] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:41 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0xc]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x11000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000570000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1671.373386][T19698] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1671.563626][T19701] IPVS: ftp: loaded support on port[0] = 21 08:50:42 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000571000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x12000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0xe]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1671.868666][T19713] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000572000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:42 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x13000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1672.187728][T19726] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000573000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x10]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1672.451760][T19736] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1672.522880][T19731] IPVS: ftp: loaded support on port[0] = 21 08:50:43 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x14000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000574000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:43 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r1 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x11]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1672.946577][T19751] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000575000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1673.090141][T19755] selinux_netlink_send: 86 callbacks suppressed [ 1673.090155][T19755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19755 comm=syz-executor.1 08:50:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x2b080000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x12]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1673.204158][T19755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19755 comm=syz-executor.1 [ 1673.219294][T19748] IPVS: ftp: loaded support on port[0] = 21 [ 1673.237693][T19755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19755 comm=syz-executor.1 08:50:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1673.275711][T19763] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1673.306286][T19755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19755 comm=syz-executor.1 08:50:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000576000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1673.374824][T19755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19755 comm=syz-executor.1 [ 1673.406205][T19755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19755 comm=syz-executor.1 [ 1673.444162][T19755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19755 comm=syz-executor.1 [ 1673.527467][T19755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19755 comm=syz-executor.1 [ 1673.596224][T19755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19755 comm=syz-executor.1 [ 1673.603123][T19774] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1673.665919][T19755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19755 comm=syz-executor.1 08:50:44 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:44 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r1 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x13]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x40000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000577000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000578000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1674.194817][T19780] IPVS: ftp: loaded support on port[0] = 21 08:50:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x14]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x60000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000579000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:45 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040"], 0x1}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000057a000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:45 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r1 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x60]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x65580000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000057b000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000057c000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x81000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1675.263316][T19823] IPVS: ftp: loaded support on port[0] = 21 08:50:46 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040"], 0x1}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000057d000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x88a8ffff}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:46 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x2]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1676.058355][T19860] __nla_validate_parse: 6 callbacks suppressed [ 1676.058364][T19860] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x3]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x9effffff}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1676.289377][T19856] IPVS: ftp: loaded support on port[0] = 21 08:50:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000057e000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1676.591763][T19879] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:47 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040"], 0x1}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:47 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xf0ffffff}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000582000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x4]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1677.105664][T19892] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000583000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xfeff0000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x5]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1677.472265][T19906] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1677.505968][T19893] IPVS: ftp: loaded support on port[0] = 21 08:50:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000584000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1677.784727][T19917] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:48 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xff0f0000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x6]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000585000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:48 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0200000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1678.148865][T19928] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000586000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xfffd0402}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1678.398333][T19935] selinux_netlink_send: 67 callbacks suppressed [ 1678.398348][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.1 [ 1678.440132][T19930] IPVS: ftp: loaded support on port[0] = 21 [ 1678.457198][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.1 08:50:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x7]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1678.482745][T19948] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0300000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1678.520330][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.1 08:50:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000587000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1678.630105][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.1 [ 1678.765405][T19959] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1678.766273][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.1 [ 1678.880228][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.1 [ 1678.942612][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.1 [ 1678.971690][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.1 [ 1678.993460][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.1 [ 1679.012566][T19935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19935 comm=syz-executor.1 08:50:49 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xffffa888}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0400000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x8]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000588000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:49 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1679.186705][T19967] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1679.237873][T19973] IPVS: ftp: loaded support on port[0] = 21 08:50:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0600000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000589000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xfffff000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x9]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0a00000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1679.468587][T19986] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000058a000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:50 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:50 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0c00000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xffffff7f}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000058b000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0xa]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1680.249006][T20011] IPVS: ftp: loaded support on port[0] = 21 08:50:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0e00000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000058c000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xffffff9e}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0xb]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0f00000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000058d000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:51 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYRES32=r4], 0x1}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:51 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000058e000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xfffffff0}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="1000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0xc]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1681.251725][T20042] __nla_validate_parse: 4 callbacks suppressed [ 1681.251735][T20042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="6000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1681.333339][T20048] IPVS: ftp: loaded support on port[0] = 21 08:50:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x40030000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000058f000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="f000000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0xe]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1681.647425][T20062] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000590000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1681.900872][T20070] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:52 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYRES32=r4], 0x1}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0003000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:52 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000591000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1682.197635][T20077] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x10]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1682.263889][T20082] IPVS: ftp: loaded support on port[0] = 21 08:50:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0006000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000592000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x100000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000a000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1682.521797][T20096] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000593000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x11]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1682.762507][T20103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:53 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYRES32=r4], 0x1}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000c000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:53 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000594000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x200000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x12]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1683.308336][T20117] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1683.386855][T20122] IPVS: ftp: loaded support on port[0] = 21 08:50:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000e000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000595000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1683.503849][T20126] selinux_netlink_send: 67 callbacks suppressed [ 1683.503864][T20126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20126 comm=syz-executor.1 08:50:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x204fdff00000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1683.579343][T20126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20126 comm=syz-executor.1 08:50:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000f000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1683.634244][T20134] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1683.651833][T20126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20126 comm=syz-executor.1 08:50:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x13]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000596000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1683.715105][T20126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20126 comm=syz-executor.1 [ 1683.747366][T20126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20126 comm=syz-executor.1 [ 1683.861878][T20126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20126 comm=syz-executor.1 [ 1683.876762][T20141] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1683.895851][T20126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20126 comm=syz-executor.1 [ 1684.007234][T20126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20126 comm=syz-executor.1 [ 1684.065292][T20126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20126 comm=syz-executor.1 [ 1684.096034][T20126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20126 comm=syz-executor.1 08:50:55 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="5010000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:55 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x300000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000597000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x14]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1684.387664][T20155] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="003f000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1684.429626][T20160] IPVS: ftp: loaded support on port[0] = 21 08:50:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000598000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0040000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x400000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x60]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000599000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:56 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="1050000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:56 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000059a000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x500000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000059b000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1685.476438][T20196] IPVS: ftp: loaded support on port[0] = 21 08:50:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="6558000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x600000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:56 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0060000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000059c000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1686.216551][T20224] IPVS: ftp: loaded support on port[0] = 21 08:50:57 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x700000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000059d000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x2]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="5865000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:57 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1686.776644][T20232] __nla_validate_parse: 4 callbacks suppressed [ 1686.776654][T20232] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000059e000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0081000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1686.884937][T20241] IPVS: ftp: loaded support on port[0] = 21 08:50:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x800000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x3]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1687.077610][T20251] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00f0000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000008060104000000000000000000000000059f000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1687.369705][T20260] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:58 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e0019030000", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:58 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:50:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005a0000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0040030000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x900000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x4]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1687.846827][T20273] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0003400000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005a1000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1688.114161][T20276] IPVS: ftp: loaded support on port[0] = 21 08:50:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="fffff00000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xa00000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1688.237690][T20289] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005a2000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x5]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1688.443490][T20299] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:59 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e0019030000", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:50:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000100000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xb00000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:50:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005a3000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:50:59 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1688.838889][T20310] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:50:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x6]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:50:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000200000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:50:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005a4000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1689.045328][T20316] selinux_netlink_send: 69 callbacks suppressed [ 1689.045343][T20316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20316 comm=syz-executor.1 08:50:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xc00000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1689.185832][T20316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20316 comm=syz-executor.1 [ 1689.216741][T20312] IPVS: ftp: loaded support on port[0] = 21 [ 1689.220549][T20325] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1689.259794][T20316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20316 comm=syz-executor.1 08:51:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000300000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005a5000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1689.402828][T20316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20316 comm=syz-executor.1 [ 1689.425989][T20316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20316 comm=syz-executor.1 08:51:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x7]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1689.475954][T20316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20316 comm=syz-executor.1 [ 1689.545950][T20316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20316 comm=syz-executor.1 [ 1689.581090][T20335] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1689.599509][T20316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20316 comm=syz-executor.1 [ 1689.736650][T20316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20316 comm=syz-executor.1 [ 1689.811601][T20316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20316 comm=syz-executor.1 08:51:00 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e0019030000", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000400000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xe00000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:00 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005a6000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x8]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1690.067967][T20348] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000600000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005a7000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xf00000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x9]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000a00000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1690.371187][T20352] IPVS: ftp: loaded support on port[0] = 21 08:51:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005a8000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:01 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e00190300000000000000", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000c00000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x1000000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:01 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005a9000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0xa]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005aa000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000e00000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x1100000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005ab000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000f00000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1691.436688][T20393] IPVS: ftp: loaded support on port[0] = 21 08:51:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0xb]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:02 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e00190300000000000000", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x1200000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000001000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:02 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005ac000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0xc]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1692.037572][T20420] __nla_validate_parse: 5 callbacks suppressed [ 1692.037580][T20420] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005ad000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000003f00000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1692.342755][T20439] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0xe]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005ae000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x1300000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000004000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1692.442095][T20428] IPVS: ftp: loaded support on port[0] = 21 [ 1692.527690][T20442] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:03 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e00190300000000000000", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000105000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005af000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x1400000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x10]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:03 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1693.120666][T20460] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000006000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005b0000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x2b08000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1693.391095][T20465] IPVS: ftp: loaded support on port[0] = 21 [ 1693.434292][T20479] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000586500000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000008100000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005b1000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:04 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e00190300000000000000000100", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x11]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1694.081317][T10918] tipc: TX() has been purged, node left! [ 1694.100839][T10918] tipc: TX() has been purged, node left! [ 1694.140416][T10918] tipc: TX() has been purged, node left! [ 1694.173260][T10918] tipc: TX() has been purged, node left! [ 1694.211527][T20493] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1694.245305][T20492] selinux_netlink_send: 65 callbacks suppressed 08:51:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="ffffa88800000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x4000000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:05 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1694.245319][T20492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20492 comm=syz-executor.1 [ 1694.297779][T20492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20492 comm=syz-executor.1 08:51:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005b2000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1694.386448][T10918] tipc: TX() has been purged, node left! [ 1694.393604][T20492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20492 comm=syz-executor.1 [ 1694.417289][T10918] tipc: TX() has been purged, node left! [ 1694.424315][T10918] tipc: TX() has been purged, node left! [ 1694.450300][T20504] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1694.461059][T10918] tipc: TX() has been purged, node left! [ 1694.464520][T20492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20492 comm=syz-executor.1 [ 1694.502193][T10918] tipc: TX() has been purged, node left! [ 1694.519106][T10918] tipc: TX() has been purged, node left! [ 1694.525248][T20492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20492 comm=syz-executor.1 08:51:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005b3000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1694.549326][T10918] tipc: TX() has been purged, node left! 08:51:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="ffffff9e00000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1694.612799][T20492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20492 comm=syz-executor.1 08:51:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x12]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1694.656169][T10918] tipc: TX() has been purged, node left! [ 1694.666835][T10918] tipc: TX() has been purged, node left! [ 1694.676799][T20492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20492 comm=syz-executor.1 [ 1694.696037][T10918] tipc: TX() has been purged, node left! [ 1694.743900][T20507] IPVS: ftp: loaded support on port[0] = 21 [ 1694.752977][T20492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20492 comm=syz-executor.1 [ 1694.766607][T10918] tipc: TX() has been purged, node left! [ 1694.773405][T10918] tipc: TX() has been purged, node left! 08:51:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x6000000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="fffffff000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1694.791261][T20515] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1694.829193][T20492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20492 comm=syz-executor.1 [ 1694.866337][T10918] tipc: TX() has been purged, node left! [ 1694.872343][T10918] tipc: TX() has been purged, node left! [ 1694.884868][T20492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20492 comm=syz-executor.1 [ 1694.910130][T10918] tipc: TX() has been purged, node left! 08:51:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005b4000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1694.962429][T10918] tipc: TX() has been purged, node left! [ 1695.002563][T10918] tipc: TX() has been purged, node left! 08:51:05 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e00190300000000000000000100", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1695.052568][T10918] tipc: TX() has been purged, node left! [ 1695.086611][T10918] tipc: TX() has been purged, node left! 08:51:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="88a8ffff00000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x13]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1695.100046][T20526] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x6558000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:05 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005b5000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1695.275662][T10918] tipc: TX() has been purged, node left! 08:51:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00f0ffff00000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1695.367794][T10918] tipc: TX() has been purged, node left! [ 1695.378552][T10918] tipc: TX() has been purged, node left! [ 1695.428454][T10918] tipc: TX() has been purged, node left! [ 1695.439263][T10918] tipc: TX() has been purged, node left! [ 1695.469493][T10918] tipc: TX() has been purged, node left! [ 1695.478217][T20547] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1695.526193][T10918] tipc: TX() has been purged, node left! [ 1695.532549][T10918] tipc: TX() has been purged, node left! 08:51:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x8100000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005b6000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1695.579457][T20542] IPVS: ftp: loaded support on port[0] = 21 [ 1695.588218][T10918] tipc: TX() has been purged, node left! 08:51:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x14]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="7fffffff00000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1695.639783][T10918] tipc: TX() has been purged, node left! [ 1695.673637][T10918] tipc: TX() has been purged, node left! [ 1695.704810][T10918] tipc: TX() has been purged, node left! [ 1695.779508][T10918] tipc: TX() has been purged, node left! [ 1695.797931][T10918] tipc: TX() has been purged, node left! [ 1695.848114][T10918] tipc: TX() has been purged, node left! [ 1695.874311][T10918] tipc: TX() has been purged, node left! [ 1695.901966][T10918] tipc: TX() has been purged, node left! 08:51:06 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1695.952921][T10918] tipc: TX() has been purged, node left! [ 1695.969348][T10918] tipc: TX() has been purged, node left! [ 1695.989462][T10918] tipc: TX() has been purged, node left! 08:51:06 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e00190300000000000000000100", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005b7000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x88a8ffff00000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="9effffff00000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1696.012134][T10918] tipc: TX() has been purged, node left! [ 1696.042101][T10918] tipc: TX() has been purged, node left! 08:51:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x60]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005b8000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="f0ffffff00000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1696.246012][T10918] tipc: TX() has been purged, node left! [ 1696.252102][T10918] tipc: TX() has been purged, node left! [ 1696.293352][T10918] tipc: TX() has been purged, node left! [ 1696.346037][T10918] tipc: TX() has been purged, node left! 08:51:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x9effffff00000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1696.402338][T20574] IPVS: ftp: loaded support on port[0] = 21 08:51:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005b9000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000034000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:07 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:07 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e0019030000000000000000010000", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005ba000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="fffffffffffff000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1697.008294][T20601] IPVS: ftp: loaded support on port[0] = 21 08:51:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000001e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1697.112421][T20597] __nla_validate_parse: 4 callbacks suppressed [ 1697.112431][T20597] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1697.147720][T20611] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005bb000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xfeff000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000002e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:08 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1697.445412][T20623] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005bc000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000003e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1697.704022][T20634] IPVS: ftp: loaded support on port[0] = 21 [ 1697.733466][T20636] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:08 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e0019030000000000000000010000", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xff0f000000000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000004e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005bd000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:08 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000006e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1698.176870][T20652] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1698.202937][T20653] IPVS: ftp: loaded support on port[0] = 21 08:51:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005be000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1698.403573][T20664] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005bf000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1698.624421][T20668] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005c0000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1698.820410][T20672] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:09 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e0019030000000000000000010000", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005c1000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000ae8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:09 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1699.081498][T20676] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005c2000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000ce8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1699.291261][T20693] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000ee8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1699.509829][T20695] IPVS: ftp: loaded support on port[0] = 21 08:51:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005c3000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x2}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:10 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r3], 0x2}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005c4000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000fe8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:10 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005c5000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000010e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005c6000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1700.304395][T20722] IPVS: ftp: loaded support on port[0] = 21 08:51:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000003fe8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005c7000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:11 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r3], 0x2}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000040e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:11 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005c8000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005c9000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000001050e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000060e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1701.324549][T20762] IPVS: ftp: loaded support on port[0] = 21 08:51:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x5}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005ca000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:12 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r3], 0x2}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:51:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000005865e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:12 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xf17) unshare(0x40040400) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005cb000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x6}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000081e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005cc000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x7}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1702.248148][T20808] __nla_validate_parse: 9 callbacks suppressed [ 1702.248157][T20808] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1702.303709][T20801] IPVS: ftp: loaded support on port[0] = 21 08:51:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000ffffa888e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005cd000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000ffffff9ee8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1702.611838][T20819] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:13 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 08:51:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:23 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xf17) unshare(0x40040400) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000fffffff0e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005ce000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x9}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:23 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 08:51:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000007fffffffe8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1712.681081][T20840] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005cf000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1712.930305][T20850] IPVS: ftp: loaded support on port[0] = 21 08:51:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0xa}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) [ 1712.972930][T20855] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000ffffffffe8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005d0000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1713.239533][T20862] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:24 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xf17) unshare(0x40040400) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0xb}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005d1000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:24 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903000000000000000001000040", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 08:51:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00f0ffffffffffffe8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1713.980840][T20876] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000003001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005d2000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1714.234206][T20890] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1714.242129][T20884] IPVS: ftp: loaded support on port[0] = 21 08:51:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005d3000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1714.319797][T20886] netlink: 232 bytes leftover after parsing attributes in process `syz-executor.5'. 08:51:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x10]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0002000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1714.515174][T20895] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005d4000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1714.939756][T20903] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}], 0x8) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) 08:51:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0003000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:51:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0xc}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:26 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 08:51:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005d5000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0004000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) [ 1715.460791][T20912] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005d6000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1715.646824][T20925] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:51:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0xe}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:51:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0006000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:51:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005d7000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:51:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x12]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1758.906824][ T0] NOHZ: local_softirq_pending 08 [ 1793.648287][T10918] tipc: TX() has been purged, node left! [ 1793.654601][T10918] tipc: TX() has been purged, node left! [ 1793.670913][T10918] tipc: TX() has been purged, node left! [ 1793.697110][T10918] tipc: TX() has been purged, node left! [ 1793.906915][T10918] tipc: TX() has been purged, node left! [ 1794.006836][T10918] tipc: TX() has been purged, node left! [ 1794.175691][T10918] tipc: TX() has been purged, node left! [ 1794.365632][T10918] tipc: TX() has been purged, node left! [ 1794.505658][T10918] tipc: TX() has been purged, node left! [ 1794.746973][T10918] tipc: TX() has been purged, node left! [ 1794.935607][T10918] tipc: TX() has been purged, node left! [ 1795.225611][T10918] tipc: TX() has been purged, node left! [ 1797.321761][ T0] NOHZ: local_softirq_pending 08 08:53:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) clone3(&(0x7f0000000380)={0x80000000, &(0x7f0000000000), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$procfs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/sysvipc/sem\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x12, 0xc00000000000000, &(0x7f0000000700)) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40005}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @remote}, 0xc) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) 08:53:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005d8000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) 08:53:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000a000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:53:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0xf}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x4, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, 0x0) 08:53:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x13]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) 08:53:15 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001740)=""/167, 0xa7}, {&(0x7f0000001800)=""/173, 0xad}], 0x8, &(0x7f00000000c0)}, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) r2 = perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x938, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) unshare(0x40040400) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1824.891357][T20969] __nla_validate_parse: 1 callbacks suppressed [ 1824.891366][T20969] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:53:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005d9000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1825.130669][T20982] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:53:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005da000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1825.200848][T20977] IPVS: ftp: loaded support on port[0] = 21 [ 1825.360496][T20984] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:53:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005db000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1825.517949][T20970] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. 08:53:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="0801000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000c000000000000e8001a800400070040000a8014000700091e853ca0c6c119ce5b0abb30dd5e8a14000700ff01000000000000000000000000000114000700fe8000000000000000000000000000bb500002804c000180080002000200000008001f00ffffffff08000c00ff00000008001b00990d000008001800ff7f000008000d000700000008001a000080000008001500000001000800170000000000180002801400018008001100863f00000800150081000000380002803400018008001e00ff030000080014004000000008001e0002000000080013008c0d0000080012000800000008000700ff070000"], 0x108}}, 0x0) 08:53:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x27, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x6c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2c}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x14]}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}}, 0x0) r4 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x0, 0x0, 0x401, 0xa, 0x20, 0x0, 0x1, r3}, {0x0, 0x3, 0xffffffff, 0x0, 0x20, 0x7f, 0x1000, 0x100000000}, {0xacb, 0x8, 0x40}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0xa3ec2124033e66fa}, 0x2, @in=@broadcast, 0x3501, 0x0, 0x0, 0x0, 0x2, 0x6, 0x2}}, 0xe8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x110000, 0x0) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f00000000c0)) [ 1825.647676][T20988] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:53:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000000806010400000000000000000000000005dc000006000000539e1adf54777913b63e9c2011fda5a047abeebf806b9dd0f294c425c84e1b05a215c7d906e7a2218d44dd4a513f510f26cbdca743984ff428c55c6dbd6d5778ea92f4be8165016ac45baca771381c97407b1124150e43328c6664c241ef0281379984c36af116b104"], 0x1c}}, 0x0) [ 1825.953436][T20994] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1827.772200][T10918] tipc: TX() has been purged, node left! [ 1831.015173][ T27] audit: type=1400 audit(1583571201.714:725): avc: denied { map } for pid=21020 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1097 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1831.869995][T21021] IPVS: ftp: loaded support on port[0] = 21 [ 1832.684639][T21021] chnl_net:caif_netlink_parms(): no params data found [ 1833.244964][T21021] bridge0: port 1(bridge_slave_0) entered blocking state [ 1833.252150][T21021] bridge0: port 1(bridge_slave_0) entered disabled state [ 1833.267969][T21021] device bridge_slave_0 entered promiscuous mode [ 1833.631957][T21021] bridge0: port 2(bridge_slave_1) entered blocking state [ 1833.655816][T21021] bridge0: port 2(bridge_slave_1) entered disabled state [ 1833.664197][T21021] device bridge_slave_1 entered promiscuous mode [ 1833.749283][T21021] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1833.762948][T21021] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1833.862703][T21021] team0: Port device team_slave_0 added [ 1833.893281][T21021] team0: Port device team_slave_1 added [ 1833.932218][T21021] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1833.947957][T21021] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1833.981044][T21021] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1834.036314][T21021] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1834.043298][T21021] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1834.142156][T21021] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1834.279744][T21021] device hsr_slave_0 entered promiscuous mode [ 1834.336191][T21021] device hsr_slave_1 entered promiscuous mode [ 1834.409127][T21021] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1834.435733][T21021] Cannot create hsr debugfs directory [ 1835.110746][T21021] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1835.197194][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1835.205218][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1835.249424][T21021] 8021q: adding VLAN 0 to HW filter on device team0 [ 1835.277254][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1835.296824][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1835.305324][T19946] bridge0: port 1(bridge_slave_0) entered blocking state [ 1835.312502][T19946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1835.412804][T20944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1835.426624][T20944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1835.435407][T20944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1835.496620][T20944] bridge0: port 2(bridge_slave_1) entered blocking state [ 1835.503701][T20944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1835.536038][T20944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1835.577438][T18214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1835.596983][T18214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1835.617990][T18214] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1835.646430][T18214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1835.655314][T18214] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1835.719982][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1835.749135][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1835.758381][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1835.777018][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1835.786531][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1835.799858][T21021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1835.882929][T18214] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1835.895378][T18214] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1835.921485][T21021] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1836.158422][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1836.186431][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1836.270109][T18209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1836.286495][T18209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1836.299683][T21021] device veth0_vlan entered promiscuous mode [ 1836.335278][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1836.363520][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1836.383080][T21021] device veth1_vlan entered promiscuous mode [ 1836.480379][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1836.495396][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1836.556557][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1836.565285][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1836.620836][T21021] device veth0_macvtap entered promiscuous mode [ 1836.668943][T21021] device veth1_macvtap entered promiscuous mode [ 1836.775369][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1836.834695][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1836.865639][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1836.901938][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1836.935121][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1836.979037][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1837.009138][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1837.045551][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1837.055401][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1837.121302][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1837.166462][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1837.201772][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1837.240648][T21021] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1837.280526][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1837.291280][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1837.299819][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1837.309376][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1837.322753][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1837.335334][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1837.335395][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1837.335399][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1837.335410][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1837.335416][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1837.335429][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1837.467297][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1837.508316][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1837.547891][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1837.565413][T21021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1837.582676][T21021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1837.594784][T21021] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1837.634718][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1837.643653][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1946.095455][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1946.102423][ C0] rcu: 0-...!: (10539 ticks this GP) idle=13a/1/0x4000000000000002 softirq=271622/271630 fqs=47 [ 1946.114450][ C0] (t=10500 jiffies g=323501 q=120) [ 1946.119661][ C0] rcu: rcu_preempt kthread starved for 10296 jiffies! g323501 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 1946.130921][ C0] rcu: RCU grace-period kthread stack dump: [ 1946.136802][ C0] rcu_preempt R running task 29384 10 2 0x80004000 [ 1946.144696][ C0] Call Trace: [ 1946.147994][ C0] ? __schedule+0x934/0x1f90 [ 1946.152597][ C0] ? __sched_text_start+0x8/0x8 [ 1946.157453][ C0] ? _raw_spin_lock_irqsave+0x94/0xbf [ 1946.162817][ C0] ? debug_smp_processor_id+0x2f/0x185 [ 1946.168277][ C0] schedule+0xd0/0x2a0 [ 1946.172348][ C0] schedule_timeout+0x474/0xba0 [ 1946.177198][ C0] ? lock_acquire+0x197/0x420 [ 1946.181869][ C0] ? usleep_range+0x160/0x160 [ 1946.186548][ C0] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 1946.192418][ C0] ? __next_timer_interrupt+0x190/0x190 [ 1946.197966][ C0] ? swake_up_one+0x60/0x60 [ 1946.202475][ C0] rcu_gp_kthread+0x9d9/0x17d0 [ 1946.207240][ C0] ? lock_acquire+0x197/0x420 [ 1946.211915][ C0] ? rcu_note_context_switch+0x18f0/0x18f0 [ 1946.218239][ C0] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 1946.224039][ C0] ? lockdep_hardirqs_on+0x417/0x5d0 [ 1946.229369][ C0] ? __kthread_parkme+0x10a/0x1c0 [ 1946.234393][ C0] ? rcu_note_context_switch+0x18f0/0x18f0 [ 1946.240197][ C0] kthread+0x357/0x430 [ 1946.244260][ C0] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 1946.249976][ C0] ret_from_fork+0x24/0x30 [ 1946.254412][ C0] NMI backtrace for cpu 0 [ 1946.258738][ C0] CPU: 0 PID: 21043 Comm: syz-executor.1 Not tainted 5.6.0-rc3-syzkaller #0 [ 1946.267398][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1946.277453][ C0] Call Trace: [ 1946.280728][ C0] [ 1946.283582][ C0] dump_stack+0x188/0x20d [ 1946.287917][ C0] nmi_cpu_backtrace.cold+0x70/0xb1 [ 1946.293184][ C0] ? lapic_can_unplug_cpu.cold+0x3b/0x3b [ 1946.298816][ C0] nmi_trigger_cpumask_backtrace+0x231/0x27e [ 1946.304798][ C0] rcu_dump_cpu_stacks+0x169/0x1b3 [ 1946.309916][ C0] rcu_sched_clock_irq.cold+0x518/0xc55 [ 1946.315462][ C0] ? trace_hardirqs_off+0x50/0x220 [ 1946.320576][ C0] update_process_times+0x25/0x60 [ 1946.325640][ C0] tick_sched_handle+0x9b/0x180 [ 1946.330493][ C0] tick_sched_timer+0x4e/0x140 [ 1946.335281][ C0] __hrtimer_run_queues+0x32c/0xdd0 [ 1946.340481][ C0] ? tick_sched_do_timer+0x1a0/0x1a0 [ 1946.345770][ C0] ? hrtimer_init+0x320/0x320 [ 1946.350443][ C0] ? ktime_get_update_offsets_now+0x2d6/0x450 [ 1946.356515][ C0] hrtimer_interrupt+0x312/0x770 [ 1946.361468][ C0] smp_apic_timer_interrupt+0x15b/0x600 [ 1946.367013][ C0] apic_timer_interrupt+0xf/0x20 [ 1946.371936][ C0] [ 1946.374872][ C0] RIP: 0010:_raw_spin_unlock_irq+0x4b/0x80 [ 1946.380674][ C0] Code: c0 88 b2 73 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 31 48 83 3d 66 5f b6 01 00 74 25 fb 66 0f 1f 44 00 00 01 00 00 00 e8 6b 5e 91 f9 65 8b 05 4c cb 44 78 85 c0 74 02 5d [ 1946.400675][ C0] RSP: 0000:ffffc90001737ce0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 1946.409086][ C0] RAX: 1ffffffff12e7651 RBX: ffff88807c8cd680 RCX: 0000000000000000 [ 1946.417050][ C0] RDX: dffffc0000000000 RSI: 0000000000000006 RDI: ffff8880a7ffa894 [ 1946.425016][ C0] RBP: ffff88807c8cd540 R08: ffff8880a7ffa000 R09: 0000000000000000 [ 1946.432978][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 1946.440942][ C0] R13: dffffc0000000000 R14: 000000000000000b R15: ffff88807c8cd540 [ 1946.449011][ C0] get_signal+0x1bce/0x24e0 [ 1946.453538][ C0] do_signal+0x7e/0x13f0 [ 1946.457773][ C0] ? force_sig_fault+0xa8/0xe0 [ 1946.462532][ C0] ? force_sig_fault_to_task+0xe0/0xe0 [ 1946.468055][ C0] ? spurious_kernel_fault_check+0xf0/0xf0 [ 1946.473872][ C0] ? setup_sigcontext+0x820/0x820 [ 1946.478913][ C0] ? __bad_area_nosemaphore+0x32c/0x420 [ 1946.484469][ C0] exit_to_usermode_loop+0x26c/0x360 [ 1946.489757][ C0] prepare_exit_to_usermode+0x305/0x380 [ 1946.495298][ C0] ret_from_intr+0x26/0x36 [ 1946.499705][ C0] RIP: 0033:0x4044f9 [ 1946.503596][ C0] Code: d0 ff ff ff 01 48 8b 7c 24 20 c7 44 24 2c 00 00 00 00 e8 ca 01 02 00 85 c0 75 23 48 6b 44 24 18 18 8b 7c 24 28 48 03 44 24 30 <48> 8b 48 10 48 8b 50 08 48 8b 30 e8 67 1d 01 00 89 44 24 2c 64 f0 [ 1946.523193][ C0] RSP: 002b:00007f566adc89e0 EFLAGS: 00010206 [ 1946.529256][ C0] RAX: 00000000216a7118 RBX: 00007f566adc96d4 RCX: 00000000004162a7 [ 1946.537219][ C0] RDX: 0d14ce957222b6a5 RSI: 0000000000000000 RDI: 0000000000000005 [ 1946.545183][ C0] RBP: 000000000076bfc0 R08: 00007f566adc89e0 R09: 000000000076bfc0 [ 1946.553298][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000ffffffff [ 1946.561267][ C0] R13: 0000000000000c1c R14: 00000000004c13cb R15: 000000000076bfcc