[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 82.622641][ T27] audit: type=1800 audit(1583959999.199:25): pid=9579 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 82.658982][ T27] audit: type=1800 audit(1583959999.199:26): pid=9579 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 82.681711][ T27] audit: type=1800 audit(1583959999.199:27): pid=9579 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.48' (ECDSA) to the list of known hosts. 2020/03/11 20:53:29 fuzzer started 2020/03/11 20:53:31 dialing manager at 10.128.0.26:41905 2020/03/11 20:53:31 syscalls: 1380 2020/03/11 20:53:31 code coverage: enabled 2020/03/11 20:53:31 comparison tracing: ioctl(KCOV_DISABLE) failed: invalid argument 2020/03/11 20:53:31 extra coverage: enabled 2020/03/11 20:53:31 setuid sandbox: enabled 2020/03/11 20:53:31 namespace sandbox: enabled 2020/03/11 20:53:31 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/11 20:53:31 fault injection: enabled 2020/03/11 20:53:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/11 20:53:31 net packet injection: enabled 2020/03/11 20:53:31 net device setup: enabled 2020/03/11 20:53:31 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/11 20:53:31 devlink PCI setup: PCI device 0000:00:10.0 is not available 20:55:55 executing program 0: 20:55:56 executing program 1: syzkaller login: [ 239.588719][ T9745] IPVS: ftp: loaded support on port[0] = 21 [ 239.937753][ T9745] chnl_net:caif_netlink_parms(): no params data found [ 240.033308][ T9748] IPVS: ftp: loaded support on port[0] = 21 20:55:56 executing program 2: [ 240.211015][ T9745] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.218685][ T9745] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.240486][ T9745] device bridge_slave_0 entered promiscuous mode [ 240.266110][ T9745] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.275235][ T9745] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.287978][ T9745] device bridge_slave_1 entered promiscuous mode [ 240.413098][ T9745] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 240.484001][ T9745] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 240.501403][ T9748] chnl_net:caif_netlink_parms(): no params data found [ 240.577164][ T9745] team0: Port device team_slave_0 added [ 240.608881][ T9745] team0: Port device team_slave_1 added [ 240.623947][ T9754] IPVS: ftp: loaded support on port[0] = 21 [ 240.742938][ T9745] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 240.752517][ T9745] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 240.782074][ T9745] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 20:55:57 executing program 3: [ 240.805742][ T9745] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 240.813003][ T9745] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 240.844474][ T9745] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 240.890368][ T9748] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.897557][ T9748] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.910602][ T9748] device bridge_slave_0 entered promiscuous mode [ 240.985932][ T9748] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.009299][ T9748] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.017557][ T9748] device bridge_slave_1 entered promiscuous mode 20:55:57 executing program 4: [ 241.142621][ T9745] device hsr_slave_0 entered promiscuous mode [ 241.180018][ T9745] device hsr_slave_1 entered promiscuous mode [ 241.271588][ T9748] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 241.293286][ T9748] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 241.334920][ T9759] IPVS: ftp: loaded support on port[0] = 21 [ 241.474358][ T9748] team0: Port device team_slave_0 added [ 241.508313][ T9754] chnl_net:caif_netlink_parms(): no params data found 20:55:58 executing program 5: [ 241.533824][ T9748] team0: Port device team_slave_1 added [ 241.659964][ T9762] IPVS: ftp: loaded support on port[0] = 21 [ 241.689560][ T9748] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 241.696697][ T9748] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 241.727259][ T9748] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 241.775506][ T9748] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 241.783454][ T9748] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 241.814882][ T9748] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 241.847558][ T9754] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.856410][ T9754] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.865157][ T9754] device bridge_slave_0 entered promiscuous mode [ 241.902509][ T9767] IPVS: ftp: loaded support on port[0] = 21 [ 241.905381][ T9754] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.920068][ T9754] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.928409][ T9754] device bridge_slave_1 entered promiscuous mode [ 242.052701][ T9748] device hsr_slave_0 entered promiscuous mode [ 242.119567][ T9748] device hsr_slave_1 entered promiscuous mode [ 242.179327][ T9748] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 242.187095][ T9748] Cannot create hsr debugfs directory [ 242.216048][ T9754] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 242.229250][ T9754] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 242.337613][ T9759] chnl_net:caif_netlink_parms(): no params data found [ 242.352359][ T9754] team0: Port device team_slave_0 added [ 242.363490][ T9754] team0: Port device team_slave_1 added [ 242.370161][ T9745] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 242.438726][ T9745] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 242.537765][ T9754] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 242.544871][ T9754] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 242.571361][ T9754] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 242.583564][ T9745] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 242.636412][ T9754] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 242.643598][ T9754] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 242.671850][ T9754] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 242.704663][ T9745] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 242.815245][ T9762] chnl_net:caif_netlink_parms(): no params data found [ 242.931917][ T9754] device hsr_slave_0 entered promiscuous mode [ 242.970304][ T9754] device hsr_slave_1 entered promiscuous mode [ 243.009260][ T9754] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 243.017305][ T9754] Cannot create hsr debugfs directory [ 243.083579][ T9759] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.091128][ T9759] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.099021][ T9759] device bridge_slave_0 entered promiscuous mode [ 243.147814][ T9759] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.155239][ T9759] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.163282][ T9759] device bridge_slave_1 entered promiscuous mode [ 243.234426][ T9767] chnl_net:caif_netlink_parms(): no params data found [ 243.270366][ T9759] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.309506][ T9762] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.316647][ T9762] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.325417][ T9762] device bridge_slave_0 entered promiscuous mode [ 243.336244][ T9759] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.369853][ T9762] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.379533][ T9762] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.387909][ T9762] device bridge_slave_1 entered promiscuous mode [ 243.424301][ T9748] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 243.488427][ T9762] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.507422][ T9762] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.542957][ T9748] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 243.603834][ T9759] team0: Port device team_slave_0 added [ 243.620454][ T9759] team0: Port device team_slave_1 added [ 243.644069][ T9748] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 243.715013][ T9762] team0: Port device team_slave_0 added [ 243.725301][ T9767] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.733142][ T9767] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.741491][ T9767] device bridge_slave_0 entered promiscuous mode [ 243.751272][ T9748] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 243.812170][ T9759] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 243.819397][ T9759] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 243.847978][ T9759] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 243.872195][ T9762] team0: Port device team_slave_1 added [ 243.878433][ T9759] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 243.885602][ T9759] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 243.911752][ T9759] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 243.923980][ T9767] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.931666][ T9767] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.942324][ T9767] device bridge_slave_1 entered promiscuous mode [ 244.007903][ T9767] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 244.048169][ T9767] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 244.071091][ T9745] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.078455][ T9754] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 244.131470][ T9762] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 244.138648][ T9762] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.169580][ T9762] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 244.245300][ T9759] device hsr_slave_0 entered promiscuous mode [ 244.310100][ T9759] device hsr_slave_1 entered promiscuous mode [ 244.389801][ T9759] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 244.398667][ T9759] Cannot create hsr debugfs directory [ 244.418025][ T9754] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 244.464282][ T9762] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 244.472680][ T9762] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.506562][ T9762] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 244.548892][ T9745] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.561495][ T9767] team0: Port device team_slave_0 added [ 244.573527][ T9754] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 244.713576][ T9762] device hsr_slave_0 entered promiscuous mode [ 244.759621][ T9762] device hsr_slave_1 entered promiscuous mode [ 244.799957][ T9762] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 244.807824][ T9762] Cannot create hsr debugfs directory [ 244.815110][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.824897][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.835811][ T9767] team0: Port device team_slave_1 added [ 244.853860][ T9754] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 244.985841][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.994745][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.004866][ T2715] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.012237][ T2715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.025223][ T9767] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 245.033787][ T9767] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.061133][ T9767] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 245.077650][ T9767] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 245.084882][ T9767] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.111760][ T9767] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 245.133737][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.142302][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.151740][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.161706][ T2859] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.168896][ T2859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.225138][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.293531][ T9767] device hsr_slave_0 entered promiscuous mode [ 245.352193][ T9767] device hsr_slave_1 entered promiscuous mode [ 245.389319][ T9767] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 245.397373][ T9767] Cannot create hsr debugfs directory [ 245.421537][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.494113][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.504749][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.513614][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.523413][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.533053][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.609747][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.618927][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.629039][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.639040][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.654307][ T9748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.665375][ T9745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.725655][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.734682][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.790498][ T9762] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 245.847102][ T9748] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.857500][ T9754] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.881959][ T9762] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 245.927396][ T9762] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 245.997694][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.007696][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.016461][ T2754] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.023542][ T2754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.034611][ T9762] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 246.105106][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.113646][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 246.122195][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.142854][ T9754] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.153559][ T9745] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.172787][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.185367][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.194013][ T2859] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.201278][ T2859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.210090][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.217902][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.226289][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.255663][ T9759] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 246.331300][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.342024][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.353781][ T2859] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.360964][ T2859] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.368821][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.377982][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.386573][ T2859] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.394011][ T2859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.402702][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.425331][ T9759] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 246.466711][ T9759] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 246.529029][ T9759] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 246.571714][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.583739][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.592707][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.602875][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.650259][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 246.658754][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.667908][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.676966][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.686155][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.695266][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.705143][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.714136][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.723003][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.731584][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.750483][ T9754] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 246.761997][ T9754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 246.782046][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 246.790635][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.806501][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.815189][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.824243][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.835368][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.844415][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.860261][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.868750][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.912438][ T9748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 246.936350][ T9767] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 246.984489][ T9767] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 247.059284][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.068240][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.077957][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 247.085926][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.095228][ T9767] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 247.158016][ T9754] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 247.183885][ T9745] device veth0_vlan entered promiscuous mode [ 247.194131][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.203488][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.213534][ T9767] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 247.286593][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 247.295116][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.311795][ T9745] device veth1_vlan entered promiscuous mode [ 247.338207][ T9762] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.365153][ T9748] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 247.382557][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 247.392175][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 247.401168][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 247.410914][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.474382][ T9754] device veth0_vlan entered promiscuous mode [ 247.486168][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 247.495138][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.505102][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.514200][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.523010][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 247.533209][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.543141][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.551662][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.581643][ T9745] device veth0_macvtap entered promiscuous mode [ 247.602871][ T9745] device veth1_macvtap entered promiscuous mode [ 247.615932][ T9762] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.624007][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 247.632492][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.641251][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.649841][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.671500][ T9754] device veth1_vlan entered promiscuous mode [ 247.731721][ T9745] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 247.755579][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.764763][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.774295][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.783625][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.792637][ T2857] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.799831][ T2857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.807966][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.817321][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.826585][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.835755][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.843964][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.862505][ T9748] device veth0_vlan entered promiscuous mode [ 247.892392][ T9745] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 247.911911][ T9748] device veth1_vlan entered promiscuous mode [ 247.930374][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 247.942516][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.952208][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.963949][ T2859] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.971732][ T2859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.983403][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.993480][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.019700][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.029501][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.038415][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.047796][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.057485][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 248.073216][ T9759] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.113199][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 248.125111][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 248.135941][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 248.148300][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.157716][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.167444][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.176205][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.200029][ T9754] device veth0_macvtap entered promiscuous mode [ 248.216392][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 248.226699][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.237328][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.248313][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 248.261325][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 248.320043][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.328759][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.347981][ T9754] device veth1_macvtap entered promiscuous mode [ 248.363749][ T9759] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.375813][ T9748] device veth0_macvtap entered promiscuous mode [ 248.390320][ T9762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 248.452459][ T9767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.465828][ T9748] device veth1_macvtap entered promiscuous mode [ 248.540619][ T9754] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 248.561184][ T9754] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 248.577907][ T9754] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 248.602334][ T9767] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.610030][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 248.618214][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 248.633742][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 248.644386][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.655826][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.665706][ T2701] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.672922][ T2701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.681586][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 248.690480][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 248.700039][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.708342][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.753481][ T9754] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 248.765292][ T9754] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 248.776732][ T9754] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 248.799965][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:56:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0xffffffff880) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) [ 248.858006][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.878706][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.889294][ T2754] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.896625][ T2754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.905330][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.940371][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.950252][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 248.968449][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.977803][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.990133][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.998610][ T2754] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.006085][ T2754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.015585][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 249.023463][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 249.031817][ T9748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 249.044761][ T9748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.057300][ T9748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 249.059024][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 249.059158][ T27] audit: type=1804 audit(1583960165.629:31): pid=9785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir125745140/syzkaller.FxG1K7/1/cgroup.controllers" dev="sda1" ino=16519 res=1 [ 249.073511][ T9748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.118636][ T9748] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 249.148541][ T9762] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 249.168943][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.177339][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 249.202988][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 249.218149][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.227655][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.241299][ T2701] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.248743][ T2701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.257344][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.295545][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.311448][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.324812][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.334782][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.344469][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.361062][ T9748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 249.373001][ T9748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.383937][ T9748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 249.396091][ T9748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.409353][ T9748] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 249.506097][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.515899][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.524599][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.533374][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 249.542557][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 249.551879][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 249.561021][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 249.593879][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.618669][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.646774][ T9759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 20:56:06 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000001040)=0x40, 0x4) [ 249.675717][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.685700][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.701699][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.737293][ T9794] IPVS: ftp: loaded support on port[0] = 21 [ 249.843750][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.860051][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.868622][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 249.890328][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 249.906453][ T9767] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 249.927116][ T9767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 20:56:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b200080000001028e6c467144d2fa833"], 0x48}}, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x44000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0xb1d000) openat$cgroup(r4, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000321be1da066443caf7643af671f34338dc55c0b99b4eb777c470766646544418ba6e8e5e22b5c434ff16e033bb47e9874c1545a0b360b7cd06c734fb96fd4587013b5277e4bd6851d478cbd55f056e3dbfc4123f5137542dc0f8e937d6d77919d5762cb1ab87da55558e85cba2c666a35ed13d6abcf0a3c0dbb6b81dc422589fd71ab9c90462b49b9a0859a69e58b49b128e1622431c8392bd3fb139ba1fa135d65cfcccfca8a7daf00b9890ce42edc3d05bd15d4c02e0b199adfa6b732429534ee8b62ba3922c64d7d8c13cfc5148352da44ce4bedefb958e4220faaa7fd05d96b6220ea3d3703b1598d8"], 0x38}}, 0x0) listen(r0, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000980)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x2c, 0x2, [@TCA_RSVP_SRC={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @TCA_RSVP_DST={0x14, 0x2, @empty}]}}]}, 0x5c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 250.091601][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.122188][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.157684][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.189474][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.204945][ T9759] 8021q: adding VLAN 0 to HW filter on device batadv0 20:56:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000cb5a21507e1d0197e02d04cf000000"], 0x8) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, 0x0) [ 250.330687][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 250.369743][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.385786][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.394052][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 20:56:07 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl(r0, 0x10001, 0x0) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x9e) [ 250.444104][ T9762] device veth0_vlan entered promiscuous mode [ 250.479398][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.514674][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.536320][ T9767] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 250.585294][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 250.630914][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.692753][ T9762] device veth1_vlan entered promiscuous mode [ 250.731416][ T9812] IPVS: ftp: loaded support on port[0] = 21 [ 250.791144][ T9759] device veth0_vlan entered promiscuous mode 20:56:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0xffffffff880) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0x19e}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r3, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r4}, 0xc) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000100)=r5) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010000000000000000003000000030000000020000000040000000000002000000000000000000000009990100000000000000010000040000000000000000020000000000000000"], &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 250.834600][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 250.853526][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 250.871506][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.911499][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 250.930834][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.943567][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.964675][ T9825] BPF:Invalid magic [ 250.980518][ T9759] device veth1_vlan entered promiscuous mode [ 251.073485][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 251.088753][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 20:56:07 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x2f9) r8 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$ARPT_SO_GET_ENTRIES(r8, 0x0, 0x61, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0x10b) [ 251.116567][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.146884][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.210350][ T9762] device veth0_macvtap entered promiscuous mode [ 251.278341][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 251.298696][ T9828] IPVS: ftp: loaded support on port[0] = 21 [ 251.306430][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 251.324401][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 251.372810][ T9762] device veth1_macvtap entered promiscuous mode [ 251.408030][ T321] tipc: TX() has been purged, node left! 20:56:08 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000001040)=0x40, 0x4) [ 251.477971][ T9759] device veth0_macvtap entered promiscuous mode [ 251.505607][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 251.524698][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 251.550635][ T9835] IPVS: ftp: loaded support on port[0] = 21 [ 251.553054][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 251.582014][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.665217][ T9759] device veth1_macvtap entered promiscuous mode [ 251.696390][ T9767] device veth0_vlan entered promiscuous mode [ 251.712911][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 251.732657][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.772340][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.895844][ T9767] device veth1_vlan entered promiscuous mode [ 251.924134][ T9759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 251.936760][ T9759] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 251.949863][ T9759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 251.961463][ T9759] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 251.972393][ T9759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 251.987693][ T9759] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.012504][ T9759] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 252.037519][ T9762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 252.076267][ T9762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.086547][ T9762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 252.109313][ T9762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.125864][ T9762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 252.137087][ T9762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.154743][ T9762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 252.165748][ T9762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.178710][ T9762] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 252.200012][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 252.208939][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 252.220752][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 252.239201][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 20:56:08 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl(r0, 0x10001, 0x0) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x9e) [ 252.248348][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 252.257805][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 252.293206][ T9830] IPVS: ftp: loaded support on port[0] = 21 [ 252.299774][ T9759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.335186][ T9759] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.346360][ T9759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.363027][ T9759] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.383683][ T9759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.401322][ T9759] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.414404][ T9759] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 252.424805][ T9848] IPVS: ftp: loaded support on port[0] = 21 [ 252.427085][ T9762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.450965][ T9762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.467775][ T9762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.486652][ T9762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.497410][ T9762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.516487][ T9762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.526637][ T9762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.543459][ T9762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.569540][ T9762] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 252.604286][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 252.620696][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.637880][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 252.648264][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.798609][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 252.809145][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.879383][ T9767] device veth0_macvtap entered promiscuous mode [ 252.964004][ T9767] device veth1_macvtap entered promiscuous mode [ 253.301442][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 253.326162][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.346226][ T9767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.368792][ T9767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.397055][ T9767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.420376][ T9767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.444330][ T9767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.464687][ T9767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.475728][ T9767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.486894][ T9767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.497406][ T9767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.508848][ T9767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.525287][ T9767] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 253.560464][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.571616][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.593914][ T9767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 20:56:10 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000001040)=0x40, 0x4) 20:56:10 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000001040)=0x40, 0x4) [ 253.649200][ T9767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.682128][ T9767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 253.705395][ T9767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.729033][ T9767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 253.740197][ T9859] IPVS: ftp: loaded support on port[0] = 21 [ 253.753834][ T9861] IPVS: ftp: loaded support on port[0] = 21 [ 253.760787][ T9767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.780510][ T9767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 253.805273][ T9767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.828389][ T9767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 253.856504][ T9767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.886947][ T9767] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 253.948964][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.964891][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:56:11 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000001040)=0x40, 0x4) 20:56:11 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000001040)=0x40, 0x4) [ 254.615424][ T9870] IPVS: ftp: loaded support on port[0] = 21 [ 254.688528][ T9875] IPVS: ftp: loaded support on port[0] = 21 20:56:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ALL_SLAVES_ACTIVE={0x5}]}}}]}, 0x3c}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0xffffffff880) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0xb00000000065808, 0x0) r4 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendfile(r4, r3, 0x0, 0xffffffff880) r5 = openat$cgroup_ro(r3, &(0x7f0000001300)='memory.swap.current\x00', 0x0, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) r8 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) connect$tipc(r8, &(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x4, 0x3}}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000380)={r9}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000001340)=@sack_info={r9, 0x1, 0x3}, &(0x7f0000001380)=0xc) 20:56:11 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000001040)=0x40, 0x4) [ 255.172570][ T9887] IPVS: ftp: loaded support on port[0] = 21 20:56:12 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @dev}, 0x6c) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000180)={{0xee, @dev={0xac, 0x14, 0x14, 0x16}, 0x4e21, 0x1, 'lblc\x00', 0x6, 0x8}, {@dev={0xac, 0x14, 0x14, 0x3c}, 0x4e20, 0x0, 0x4, 0x1, 0x7ff}}, 0x44) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip_vti0\x00', 0x1e4) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000040)="2400000020002501075f0165ff61fc2280000000001000220ee1000c08000d00feff1700", 0x24) getsockopt$inet_udp_int(r2, 0x11, 0x54, &(0x7f0000000000), &(0x7f00000000c0)=0x4) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffffb5, 0x60, 0x0, 0xffffffffffffff8a) 20:56:12 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @dev}, 0x6c) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000180)={{0xee, @dev={0xac, 0x14, 0x14, 0x16}, 0x4e21, 0x1, 'lblc\x00', 0x6, 0x8}, {@dev={0xac, 0x14, 0x14, 0x3c}, 0x4e20, 0x0, 0x4, 0x1, 0x7ff}}, 0x44) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip_vti0\x00', 0x1e4) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000040)="2400000020002501075f0165ff61fc2280000000001000220ee1000c08000d00feff1700", 0x24) getsockopt$inet_udp_int(r2, 0x11, 0x54, &(0x7f0000000000), &(0x7f00000000c0)=0x4) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffffb5, 0x60, 0x0, 0xffffffffffffff8a) 20:56:12 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x9c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) sendto$inet(r0, &(0x7f0000000100)="8c44c31aba94081eb43a770d8c01c5b7a5af7ebf51fcf1b51205c70cfaf08f598001c0000000f4a7bdf9b6d40eadab579d95b608941aed06326714df56c508264230ae3c8b8e222dd158e7ee7ef7522c708e915bdfd2c86bd844a7bc111e8e1f4f2dfc3852d2dc4c96424e2f07401eace98efb39a8df768e4cdf76d89bb2d42669aba114701a6932f0e5b9aa59abfb1f1f42c36b3598dd912d8082cabbcd6f8b8e4dc9672962594495a34e49872b785d941f5ab31e8897f030b637bd259d70c1c84cc47f72505a7ffa24be93c3e7d20cce71f054550acb4353c87d62a36f8b4717057a6900"/240, 0xf0, 0x20000000, &(0x7f0000fd9ff0)={0x2, 0x4e1e, @rand_addr=0x3}, 0x10) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) ioctl$SIOCRSGCAUSE(r2, 0x89e0, &(0x7f0000000000)) 20:56:13 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x2f9) r8 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$ARPT_SO_GET_ENTRIES(r8, 0x0, 0x61, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0x10b) [ 256.700094][ T9921] IPVS: ftp: loaded support on port[0] = 21 20:56:14 executing program 0: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000002060000000000000000000000000000120003006269746d61703a69702c6d61630000000900020073797a3100000000100007800c000180080003"], 0x1}}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000207000000000000000000000000020a28c4078008000940000000001800"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x34, 0x1}, @sack_perm, @sack_perm], 0x3) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000200), 0x4) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='$', 0x1, 0x88c, 0x0, 0x0) 20:56:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x2011, r5, 0x0) mkdirat$cgroup(r5, &(0x7f00000000c0)='syz1\x00', 0x1ff) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PUBL_GET(r7, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000002900)={0x18, r6, 0xf591d3ee456bd401, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000ec0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000200}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="009039b6420d8a8cd85103290010300711e5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1c40}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x110, r6, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff24e1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}]}, @TIPC_NLA_SOCK={0x88, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xab}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8001}]}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x8080}, 0x8004) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xfffffffffffffcf1, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000db881e3fb4599c9b7cbbeeeacbe34a"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=@ipv6_newroute={0x114, 0x18, 0x100, 0x70bd2d, 0x25dfdbfc, {0xa, 0x20, 0x0, 0x4, 0xfc, 0x3, 0xfd, 0x1, 0x2800}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_METRICS={0xe7, 0x8, 0x0, 0x1, "eebef6dbdc7b22e9bd06565018f178f27319a0856ab21e83f125b7a6a21143c0f05cf49db5dde1a1abe11abcf21f9ae99475b4e2853732687db9d4ccf3b6ea74b2e71fd02ad9fa3d7f4d384d7edfde9aeefe273c32daabb0eff1bae28bb69e92581546dd0edf2bc052182cd9c50d8d0c396ad12958df7f42e5dd44b67e53f3a3340c4b192aeebf12c5f6f59f0f7d2fcbc6c35b9dab81359ec2bf9971acf27170fe4ece1c091c478690f8ee1fce4a6855107f543bed5220b2dc1754bb37f56caf1d8049b6a8422949d139799f31b127637d24dcab281fab8530f5fcb7a3c5448df47221"}]}, 0xffffffffffffffd5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x28, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x0, 0x20}, [@IFLA_TARGET_NETNSID={0x8}]}, 0x28}}, 0x0) 20:56:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x240007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) sendmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000640)="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", 0x3a1}], 0x1}}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x1) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) r4 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000005c0)={0x0, 0x3}, &(0x7f0000000b00)=0x8) sendmsg$nl_crypto(r3, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0xe0}, 0x1, 0x0, 0x0, 0x10}, 0x404) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x40}}, 0x0) r7 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@empty, @in6=@mcast1, 0x4e22, 0x0, 0x4e24, 0x1, 0xa, 0xa0, 0x80, 0x3a, r5, r8}, {0xb0, 0x200, 0x9, 0x100000001, 0x77, 0xffffffffffffff49, 0x8, 0x9}, {0x40, 0x7fff, 0x100000001, 0x100000000}, 0xbc1, 0x6e6bb2, 0x1, 0x1, 0x1, 0x3}, {{@in6=@ipv4={[], [], @multicast1}, 0x4d4, 0x32}, 0x2, @in6=@mcast2, 0x3504, 0x0, 0x1, 0x3, 0x9, 0x7fff, 0x9}}, 0xe8) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9091a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl(r9, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 20:56:14 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000001040)=0x40, 0x4) 20:56:14 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x9c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) sendto$inet(r0, &(0x7f0000000100)="8c44c31aba94081eb43a770d8c01c5b7a5af7ebf51fcf1b51205c70cfaf08f598001c0000000f4a7bdf9b6d40eadab579d95b608941aed06326714df56c508264230ae3c8b8e222dd158e7ee7ef7522c708e915bdfd2c86bd844a7bc111e8e1f4f2dfc3852d2dc4c96424e2f07401eace98efb39a8df768e4cdf76d89bb2d42669aba114701a6932f0e5b9aa59abfb1f1f42c36b3598dd912d8082cabbcd6f8b8e4dc9672962594495a34e49872b785d941f5ab31e8897f030b637bd259d70c1c84cc47f72505a7ffa24be93c3e7d20cce71f054550acb4353c87d62a36f8b4717057a6900"/240, 0xf0, 0x20000000, &(0x7f0000fd9ff0)={0x2, 0x4e1e, @rand_addr=0x3}, 0x10) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) ioctl$SIOCRSGCAUSE(r2, 0x89e0, &(0x7f0000000000)) 20:56:14 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x2f9) r8 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$ARPT_SO_GET_ENTRIES(r8, 0x0, 0x61, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0x10b) [ 258.107454][ T9931] IPVS: ftp: loaded support on port[0] = 21 [ 258.250099][ T9933] IPVS: ftp: loaded support on port[0] = 21 [ 258.273171][ T321] tipc: TX() has been purged, node left! 20:56:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x41}, 0x1c) r2 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@un=@abs, &(0x7f00000000c0)=0x80, 0x35addd291b9750) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e24, 0x8, @mcast1, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0xb1d000) r4 = openat$cgroup_ro(r3, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 258.360718][ T321] tipc: TX() has been purged, node left! 20:56:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x2, "9d72057776e13437"}) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_FD1={0x8, 0x2, r2}]}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 258.413499][ T9932] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 258.427216][ T321] tipc: TX() has been purged, node left! [ 258.458760][ T321] tipc: TX() has been purged, node left! [ 258.477479][ T9947] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 258.543350][ T321] tipc: TX() has been purged, node left! [ 258.581641][ T321] tipc: TX() has been purged, node left! [ 258.600456][ T321] tipc: TX() has been purged, node left! 20:56:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x2011, r5, 0x0) mkdirat$cgroup(r5, &(0x7f00000000c0)='syz1\x00', 0x1ff) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PUBL_GET(r7, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000002900)={0x18, r6, 0xf591d3ee456bd401, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000ec0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000200}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="009039b6420d8a8cd85103290010300711e5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1c40}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x110, r6, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff24e1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}]}, @TIPC_NLA_SOCK={0x88, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xab}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8001}]}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x8080}, 0x8004) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xfffffffffffffcf1, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000db881e3fb4599c9b7cbbeeeacbe34a"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=@ipv6_newroute={0x114, 0x18, 0x100, 0x70bd2d, 0x25dfdbfc, {0xa, 0x20, 0x0, 0x4, 0xfc, 0x3, 0xfd, 0x1, 0x2800}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_METRICS={0xe7, 0x8, 0x0, 0x1, "eebef6dbdc7b22e9bd06565018f178f27319a0856ab21e83f125b7a6a21143c0f05cf49db5dde1a1abe11abcf21f9ae99475b4e2853732687db9d4ccf3b6ea74b2e71fd02ad9fa3d7f4d384d7edfde9aeefe273c32daabb0eff1bae28bb69e92581546dd0edf2bc052182cd9c50d8d0c396ad12958df7f42e5dd44b67e53f3a3340c4b192aeebf12c5f6f59f0f7d2fcbc6c35b9dab81359ec2bf9971acf27170fe4ece1c091c478690f8ee1fce4a6855107f543bed5220b2dc1754bb37f56caf1d8049b6a8422949d139799f31b127637d24dcab281fab8530f5fcb7a3c5448df47221"}]}, 0xffffffffffffffd5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x28, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x0, 0x20}, [@IFLA_TARGET_NETNSID={0x8}]}, 0x28}}, 0x0) [ 258.670501][ T321] tipc: TX() has been purged, node left! [ 258.694963][ T321] tipc: TX() has been purged, node left! 20:56:15 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x18}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xbe, &(0x7f000000cf3d)=""/190, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x9}, 0x10}, 0x78) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) socket$inet(0x2, 0x800, 0x3) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000100)=0x20, 0x4) [ 258.923804][ T9969] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:15 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x2f9) r8 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$ARPT_SO_GET_ENTRIES(r8, 0x0, 0x61, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000e7000000e29619ef2d768ff0094af8d8894d67505d00f6a7783480c150a7ae5cbf377529fa831160fc0d2bfe277a63938dea598337c1093bf2f68b8da918a41c75b9c2a15d38a1e2bd11642dbbd7ca20a2c18d82828f598d1c78f626fb20313030f1db91ac18f2ff9907c87c86d56d7cf0b9e815b176ef720b343b7e3ac4ef6c42dd3ea3235d1e574830ae7fdd98e49034932954012aaf5edd94f09df6275fbb98ec01faffffffffffffff3536c962b6759904b04609f80aaeab64e238742908da393df12b06568b8a3f3e47537ef0c033e242641a84bac91acefa4b702f935f9fddd054310d0e4b11f721"], &(0x7f0000000240)=0x10b) 20:56:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x240007fd, &(0x7f0000e68000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) sendmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000640)="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", 0x3a1}], 0x1}}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x1) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) r4 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000005c0)={0x0, 0x3}, &(0x7f0000000b00)=0x8) sendmsg$nl_crypto(r3, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0xe0}, 0x1, 0x0, 0x0, 0x10}, 0x404) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x40}}, 0x0) r7 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@empty, @in6=@mcast1, 0x4e22, 0x0, 0x4e24, 0x1, 0xa, 0xa0, 0x80, 0x3a, r5, r8}, {0xb0, 0x200, 0x9, 0x100000001, 0x77, 0xffffffffffffff49, 0x8, 0x9}, {0x40, 0x7fff, 0x100000001, 0x100000000}, 0xbc1, 0x6e6bb2, 0x1, 0x1, 0x1, 0x3}, {{@in6=@ipv4={[], [], @multicast1}, 0x4d4, 0x32}, 0x2, @in6=@mcast2, 0x3504, 0x0, 0x1, 0x3, 0x9, 0x7fff, 0x9}}, 0xe8) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9091a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl(r9, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 20:56:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xb1d000) openat$cgroup(r0, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0xb1d000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xb1d000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendfile(r4, r3, 0x0, 0xffffffff880) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0xb1d000) r6 = openat$cgroup_ro(r5, &(0x7f0000000500)='memory.stat\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\x00', 0xb1d000) r7 = openat$cgroup_ro(r6, &(0x7f0000000400)='rdma.current\x00', 0x26e1, 0x0) socket$rxrpc(0x21, 0x2, 0xa) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="85000000610000005400000000000000950000000000000085ee1954fbc378c7a9afee2df3645efd2a6a1fa97189241e6798d52493bb9ad4d5fd7be5a29fcba2f686f2fccef551908d99919bd4c567baf407f939b6d565cd99a3252f7b"], &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r8, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) pwritev(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x8040000) ioctl$FS_IOC_RESVSP(r7, 0x40305829, &(0x7f0000000040)={0x0, 0x0, 0xff00, 0xa00000}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r7, 0x8982, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r9, &(0x7f00000001c0)='T', 0x1, 0xffff) write$cgroup_int(r9, &(0x7f0000000000), 0xffffff6a) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)=0x3, 0xff7e) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r10, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000001300)={0x2880008, r9, 0x0, 0x0, 0x0, 0x2}) syz_genetlink_get_family_id$nl80211(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r10, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) openat$cgroup_ro(r10, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r11, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$cgroup_int(r12, &(0x7f0000000180)=0x3, 0xff7e) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r14 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r14, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r14, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) connect$inet(r14, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendfile(r14, r13, 0x0, 0xffffffff880) ioctl$PPPIOCSNPMODE(r13, 0x4008744b, &(0x7f0000000100)={0x80fd}) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, 0x0, 0x4000001) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) 20:56:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x2011, r5, 0x0) mkdirat$cgroup(r5, &(0x7f00000000c0)='syz1\x00', 0x1ff) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PUBL_GET(r7, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000002900)={0x18, r6, 0xf591d3ee456bd401, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000ec0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000200}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="009039b6420d8a8cd85103290010300711e5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1c40}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x110, r6, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff24e1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}]}, @TIPC_NLA_SOCK={0x88, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xab}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8001}]}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x8080}, 0x8004) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xfffffffffffffcf1, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000db881e3fb4599c9b7cbbeeeacbe34a"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=@ipv6_newroute={0x114, 0x18, 0x100, 0x70bd2d, 0x25dfdbfc, {0xa, 0x20, 0x0, 0x4, 0xfc, 0x3, 0xfd, 0x1, 0x2800}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_METRICS={0xe7, 0x8, 0x0, 0x1, "eebef6dbdc7b22e9bd06565018f178f27319a0856ab21e83f125b7a6a21143c0f05cf49db5dde1a1abe11abcf21f9ae99475b4e2853732687db9d4ccf3b6ea74b2e71fd02ad9fa3d7f4d384d7edfde9aeefe273c32daabb0eff1bae28bb69e92581546dd0edf2bc052182cd9c50d8d0c396ad12958df7f42e5dd44b67e53f3a3340c4b192aeebf12c5f6f59f0f7d2fcbc6c35b9dab81359ec2bf9971acf27170fe4ece1c091c478690f8ee1fce4a6855107f543bed5220b2dc1754bb37f56caf1d8049b6a8422949d139799f31b127637d24dcab281fab8530f5fcb7a3c5448df47221"}]}, 0xffffffffffffffd5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x28, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x0, 0x20}, [@IFLA_TARGET_NETNSID={0x8}]}, 0x28}}, 0x0) [ 259.375033][ T9994] IPVS: ftp: loaded support on port[0] = 21 [ 259.495816][T10004] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:16 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x10, 0x4, 0x4, 0x4, 0x0, 0x1, 0x2, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r2}, 0xc) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x7, 0x8}, 0xc) openat$cgroup_ro(r3, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x2, &(0x7f0000001280)=ANY=[@ANYBLOB="81696f1f95fa8794b09179b475f107f4a917a3969e7ff8bd3b78872ae739df117cc724455eb85054ebe6c9fdda0e0843fc8c797fa7712f828101a2243f4b4c7b5d3b85fe40d6bf118af146d035e03e", @ANYRES32=r3, @ANYBLOB="00000000d4060000"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 259.699166][ T27] audit: type=1804 audit(1583960176.259:32): pid=10011 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir125745140/syzkaller.FxG1K7/7/memory.events" dev="sda1" ino=16554 res=1 20:56:16 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) 20:56:16 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x44050, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb67b9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) recvfrom(r3, &(0x7f0000000440)=""/207, 0xcf, 0x40000000, &(0x7f0000000300)=@isdn={0x22, 0x7, 0x7, 0xfffffffffffffff8, 0x5}, 0x80) r4 = socket(0x1b, 0x5, 0x6) recvmsg$kcm(r4, &(0x7f0000001d40)={&(0x7f0000000900)=@nl=@proc, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000980)=""/40, 0x28}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/89, 0x59}, {&(0x7f0000001b00)=""/253, 0xfd}], 0x5, &(0x7f0000001c80)=""/134, 0x86}, 0x2) ioctl(r2, 0xfff, &(0x7f0000000040)='\x00'/11) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f0000000100)=0x7, 0x4) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) write$binfmt_elf32(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/401], 0x191) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'\x00', 0x0}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000000740), &(0x7f0000000680)=0xffffffffffffffe6) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000540)={0x3, 0x8, 0x8, 0x0, 0x8, 0x9, 0x1, 0x4, 0x0}, &(0x7f0000000580)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f00000005c0)={r7, 0x1f, 0x9}, &(0x7f0000000600)=0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r6}) setsockopt$inet6_udp_int(r5, 0x11, 0x1, &(0x7f0000000080), 0x4) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000700)=r8, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) socket$packet(0x11, 0x2, 0x300) r9 = accept(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r1, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 20:56:16 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x10, 0x4, 0x4, 0x4, 0x0, 0x1, 0x2, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r2}, 0xc) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x7, 0x8}, 0xc) openat$cgroup_ro(r3, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x2, &(0x7f0000001280)=ANY=[@ANYBLOB="81696f1f95fa8794b09179b475f107f4a917a3969e7ff8bd3b78872ae739df117cc724455eb85054ebe6c9fdda0e0843fc8c797fa7712f828101a2243f4b4c7b5d3b85fe40d6bf118af146d035e03e", @ANYRES32=r3, @ANYBLOB="00000000d4060000"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 259.779581][ T27] audit: type=1804 audit(1583960176.289:33): pid=10011 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir125745140/syzkaller.FxG1K7/7/memory.events" dev="sda1" ino=16554 res=1 20:56:16 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x2f9) socket$l2tp(0x2, 0x2, 0x73) 20:56:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x2c, 0x0, 0xb, 0x49de4d1c41542053, 0x0, 0x0, {}, [@NFCTH_TUPLE={0xc, 0x2, [@CTA_TUPLE_ZONE={0x8}]}, @NFCTH_NAME={0xc, 0x1, 'syz1\x00'}]}, 0x2c}}, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 259.905120][T10020] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r1, &(0x7f0000000300), 0x121, 0x0, 0x0) shutdown(r0, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@sco={0x1f, @none}, &(0x7f0000000000)=0x80, 0x1800) sendto$llc(r2, &(0x7f00000001c0)="bb946887b2cdc36886daaa108a840cf5348d3c9863d8e5ad72b80afc388b50b91f9d32e2efe9867e34af604df1e4b59a945ca4c5599c7d5f7ebd57c161547160d2f3c6c561a3972c83ec47dfb669f2b3c6fa658a2f6690957e99b86e3e94eb069faebd82484f8f86b5d60a795c82fe154ac61729a45bd5373c5bf3aa1cf6bb2a9ff5cb73c5d265d93f64c5b94fc9593b8fa1074bb098f92e509cfbf0c4523e415945aeabb66184a885ba076e505ecb11687667e08f888c197de849c64d80e1a42c81d812bf781f27cda91b1d71adb2f34e911444", 0xd4, 0x400c0, &(0x7f00000002c0)={0x1a, 0x312, 0x3c, 0x45, 0x81, 0x40, @random="32663fa11b73"}, 0x10) r3 = socket$inet6(0xa, 0x80003, 0x6b) r4 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f0000000080)={{0xc, @rand_addr=0x7, 0x4e22, 0x1, 'sh\x00', 0x15, 0xffffffff, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2f}, 0x4e21, 0x0, 0x7fff, 0x4, 0x1}}, 0x44) ioctl(r3, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x240, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f0000000400)={0x200, r5, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x78, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xcd80}]}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x81}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x40}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3d}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe530}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe9e8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_LINK={0xf8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4a66}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xce}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x118}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x83}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x14}, 0x20044810) [ 260.045654][T10023] IPVS: ftp: loaded support on port[0] = 21 [ 260.074182][T10020] [ 260.078127][T10020] ============================================ [ 260.088291][T10020] WARNING: possible recursive locking detected [ 260.098129][T10020] 5.6.0-rc3-syzkaller #0 Not tainted [ 260.108596][T10020] -------------------------------------------- [ 260.110781][T10033] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 260.121211][T10020] syz-executor.4/10020 is trying to acquire lock: [ 260.121218][T10020] ffff888056366250 (sk_lock-AF_INET6){+.+.}, at: inet_csk_accept+0x69f/0xd30 [ 260.121393][T10020] [ 260.121393][T10020] but task is already holding lock: [ 260.142163][ T27] audit: type=1804 audit(1583960176.649:34): pid=10034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir125745140/syzkaller.FxG1K7/7/memory.events" dev="sda1" ino=16554 res=1 [ 260.144262][T10020] ffff88805d2cb550 (sk_lock-AF_INET6){+.+.}, at: inet_csk_accept+0x8d/0xd30 [ 260.144291][T10020] [ 260.144291][T10020] other info that might help us debug this: [ 260.144294][T10020] Possible unsafe locking scenario: [ 260.144294][T10020] [ 260.144304][T10020] CPU0 [ 260.221358][T10020] ---- [ 260.225103][T10020] lock(sk_lock-AF_INET6); [ 260.229792][T10020] lock(sk_lock-AF_INET6); [ 260.234474][T10020] [ 260.234474][T10020] *** DEADLOCK *** [ 260.234474][T10020] [ 260.245368][T10020] May be due to missing lock nesting notation [ 260.245368][T10020] [ 260.259661][T10020] 1 lock held by syz-executor.4/10020: [ 260.268497][T10020] #0: ffff88805d2cb550 (sk_lock-AF_INET6){+.+.}, at: inet_csk_accept+0x8d/0xd30 [ 260.285089][T10020] [ 260.285089][T10020] stack backtrace: [ 260.293815][T10020] CPU: 1 PID: 10020 Comm: syz-executor.4 Not tainted 5.6.0-rc3-syzkaller #0 [ 260.304022][T10020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.314876][T10020] Call Trace: [ 260.318596][T10020] dump_stack+0x188/0x20d [ 260.323353][T10020] __lock_acquire.cold+0x114/0x288 [ 260.329979][T10020] ? find_held_lock+0x2d/0x110 [ 260.337338][T10020] ? mark_held_locks+0xe0/0xe0 [ 260.343657][T10020] ? inet_csk_accept+0x4e5/0xd30 [ 260.349530][T10020] lock_acquire+0x197/0x420 [ 260.354607][T10020] ? inet_csk_accept+0x69f/0xd30 [ 260.360169][T10020] lock_sock_nested+0xc5/0x110 [ 260.365209][T10020] ? inet_csk_accept+0x69f/0xd30 [ 260.371176][T10020] inet_csk_accept+0x69f/0xd30 [ 260.376822][T10020] ? percpu_counter_add_batch+0x123/0x180 [ 260.384248][T10020] ? inet_csk_listen_stop+0xb20/0xb20 [ 260.391206][T10020] ? aa_label_sk_perm+0x89/0xe0 [ 260.396524][T10020] ? aa_sk_perm+0x319/0xab0 [ 260.401249][T10020] inet_accept+0xe9/0x7c0 [ 260.406307][T10020] ? ipv4_mib_exit_net+0x180/0x180 [ 260.411442][T10020] ? __alloc_fd+0x46d/0x600 [ 260.416013][T10020] ? ipv4_mib_exit_net+0x180/0x180 [ 260.421218][T10020] __sys_accept4_file+0x3ac/0x5b0 [ 260.426742][T10020] ? __ia32_sys_listen+0x70/0x70 [ 260.432587][T10020] ? ksys_dup3+0x3c0/0x3c0 [ 260.437935][T10020] ? __x64_sys_futex+0x380/0x4f0 [ 260.445945][T10020] __sys_accept4+0x53/0x90 [ 260.451331][T10020] __x64_sys_accept+0x71/0xb0 [ 260.457679][T10020] ? lockdep_hardirqs_on+0x417/0x5d0 [ 260.463859][T10020] do_syscall_64+0xf6/0x790 [ 260.468676][T10020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.475243][T10020] RIP: 0033:0x45c679 [ 260.480519][T10020] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.501732][T10020] RSP: 002b:00007fdf72ea8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 260.511792][T10020] RAX: ffffffffffffffda RBX: 00007fdf72ea96d4 RCX: 000000000045c679 [ 260.521425][T10020] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 260.530545][T10020] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 260.538649][T10020] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 260.546823][T10020] R13: 0000000000000000 R14: 00000000004c2878 R15: 000000000076bf0c [ 260.578768][ T27] audit: type=1800 audit(1583960176.649:35): pid=10034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16554 res=0 [ 260.609963][T10041] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 260.628032][ T27] audit: type=1804 audit(1583960176.649:36): pid=10035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir125745140/syzkaller.FxG1K7/7/memory.events" dev="sda1" ino=16554 res=1 [ 260.660876][T10044] IPVS: ftp: loaded support on port[0] = 21 [ 260.694625][T10033] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 260.707113][ T27] audit: type=1804 audit(1583960177.159:37): pid=10011 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir125745140/syzkaller.FxG1K7/7/memory.events" dev="sda1" ino=16554 res=1 [ 260.778435][ T27] audit: type=1804 audit(1583960177.229:38): pid=10037 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir125745140/syzkaller.FxG1K7/7/memory.events" dev="sda1" ino=16554 res=1 [ 260.918429][T10051] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(173806314051638) <= P.seqno(0) <= S.SWH(173806314051712)) and (P.ackno exists or LAWL(227112634113988) <= P.ackno(227112634113989) <= S.AWH(227112634113989), sending SYNC... 20:56:17 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x2f9) socket$l2tp(0x2, 0x2, 0x73) 20:56:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x2c, 0x0, 0xb, 0x49de4d1c41542053, 0x0, 0x0, {}, [@NFCTH_TUPLE={0xc, 0x2, [@CTA_TUPLE_ZONE={0x8}]}, @NFCTH_NAME={0xc, 0x1, 'syz1\x00'}]}, 0x2c}}, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 261.010903][T10016] dccp_close: ABORT with 1061 bytes unread [ 261.042463][T10020] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:17 executing program 0: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x2f9) socket$l2tp(0x2, 0x2, 0x73) [ 261.118384][T10060] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 261.154453][T10060] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 20:56:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r1, &(0x7f0000000300), 0x121, 0x0, 0x0) shutdown(r0, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@sco={0x1f, @none}, &(0x7f0000000000)=0x80, 0x1800) sendto$llc(r2, &(0x7f00000001c0)="bb946887b2cdc36886daaa108a840cf5348d3c9863d8e5ad72b80afc388b50b91f9d32e2efe9867e34af604df1e4b59a945ca4c5599c7d5f7ebd57c161547160d2f3c6c561a3972c83ec47dfb669f2b3c6fa658a2f6690957e99b86e3e94eb069faebd82484f8f86b5d60a795c82fe154ac61729a45bd5373c5bf3aa1cf6bb2a9ff5cb73c5d265d93f64c5b94fc9593b8fa1074bb098f92e509cfbf0c4523e415945aeabb66184a885ba076e505ecb11687667e08f888c197de849c64d80e1a42c81d812bf781f27cda91b1d71adb2f34e911444", 0xd4, 0x400c0, &(0x7f00000002c0)={0x1a, 0x312, 0x3c, 0x45, 0x81, 0x40, @random="32663fa11b73"}, 0x10) r3 = socket$inet6(0xa, 0x80003, 0x6b) r4 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f0000000080)={{0xc, @rand_addr=0x7, 0x4e22, 0x1, 'sh\x00', 0x15, 0xffffffff, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2f}, 0x4e21, 0x0, 0x7fff, 0x4, 0x1}}, 0x44) ioctl(r3, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x240, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f0000000400)={0x200, r5, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x78, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xcd80}]}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x81}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x40}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3d}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe530}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe9e8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_LINK={0xf8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4a66}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xce}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x118}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x83}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x14}, 0x20044810) [ 261.223352][T10060] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 261.262864][T10061] IPVS: ftp: loaded support on port[0] = 21 20:56:17 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) [ 261.276259][T10071] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(48154191960259) <= P.seqno(0) <= S.SWH(48154191960333)) and (P.ackno exists or LAWL(68926046532170) <= P.ackno(68926046532171) <= S.AWH(68926046532171), sending SYNC... [ 261.372370][T10016] dccp_close: ABORT with 1062 bytes unread [ 261.389758][T10081] IPVS: ftp: loaded support on port[0] = 21 20:56:18 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x44050, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb67b9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) recvfrom(r3, &(0x7f0000000440)=""/207, 0xcf, 0x40000000, &(0x7f0000000300)=@isdn={0x22, 0x7, 0x7, 0xfffffffffffffff8, 0x5}, 0x80) r4 = socket(0x1b, 0x5, 0x6) recvmsg$kcm(r4, &(0x7f0000001d40)={&(0x7f0000000900)=@nl=@proc, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000980)=""/40, 0x28}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/89, 0x59}, {&(0x7f0000001b00)=""/253, 0xfd}], 0x5, &(0x7f0000001c80)=""/134, 0x86}, 0x2) ioctl(r2, 0xfff, &(0x7f0000000040)='\x00'/11) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f0000000100)=0x7, 0x4) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) write$binfmt_elf32(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/401], 0x191) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'\x00', 0x0}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000000740), &(0x7f0000000680)=0xffffffffffffffe6) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000540)={0x3, 0x8, 0x8, 0x0, 0x8, 0x9, 0x1, 0x4, 0x0}, &(0x7f0000000580)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f00000005c0)={r7, 0x1f, 0x9}, &(0x7f0000000600)=0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r6}) setsockopt$inet6_udp_int(r5, 0x11, 0x1, &(0x7f0000000080), 0x4) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000700)=r8, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) socket$packet(0x11, 0x2, 0x300) r9 = accept(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r1, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) [ 261.417689][T10075] IPVS: ftp: loaded support on port[0] = 21 20:56:18 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x2f9) [ 261.568195][T10088] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x2c, 0x0, 0xb, 0x49de4d1c41542053, 0x0, 0x0, {}, [@NFCTH_TUPLE={0xc, 0x2, [@CTA_TUPLE_ZONE={0x8}]}, @NFCTH_NAME={0xc, 0x1, 'syz1\x00'}]}, 0x2c}}, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 261.701714][T10093] IPVS: ftp: loaded support on port[0] = 21 20:56:18 executing program 0: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x2f9) socket$l2tp(0x2, 0x2, 0x73) [ 261.751297][T10101] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 261.778075][T10101] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 261.807050][T10088] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(240311640092939) <= P.seqno(0) <= S.SWH(240311640093013)) and (P.ackno exists or LAWL(251084063764160) <= P.ackno(251084063764161) <= S.AWH(251084063764161), sending SYNC... 20:56:18 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x44050, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb67b9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) recvfrom(r3, &(0x7f0000000440)=""/207, 0xcf, 0x40000000, &(0x7f0000000300)=@isdn={0x22, 0x7, 0x7, 0xfffffffffffffff8, 0x5}, 0x80) r4 = socket(0x1b, 0x5, 0x6) recvmsg$kcm(r4, &(0x7f0000001d40)={&(0x7f0000000900)=@nl=@proc, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000980)=""/40, 0x28}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/89, 0x59}, {&(0x7f0000001b00)=""/253, 0xfd}], 0x5, &(0x7f0000001c80)=""/134, 0x86}, 0x2) ioctl(r2, 0xfff, &(0x7f0000000040)='\x00'/11) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f0000000100)=0x7, 0x4) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) write$binfmt_elf32(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000038000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000f5ffae94c79828a645c10000000000000000000000000000000000000000000020000000000008000000000000000000000000009300000000000000000000000000000000000000000000000000000000000000000000000000000000000000002da821cf71b02d3eaba2d5adf3d80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a5b6000000000000000000000000000000000000000000001f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000004b7b84aa84e804978a8ff6ad7b09000000000001528566fdc600"/401], 0x191) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'\x00', 0x0}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000000740), &(0x7f0000000680)=0xffffffffffffffe6) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000540)={0x3, 0x8, 0x8, 0x0, 0x8, 0x9, 0x1, 0x4, 0x0}, &(0x7f0000000580)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f00000005c0)={r7, 0x1f, 0x9}, &(0x7f0000000600)=0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r6}) setsockopt$inet6_udp_int(r5, 0x11, 0x1, &(0x7f0000000080), 0x4) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000700)=r8, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) socket$packet(0x11, 0x2, 0x300) r9 = accept(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r1, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) [ 261.872371][T10106] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 20:56:18 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) [ 261.974224][T10087] dccp_close: ABORT with 1061 bytes unread [ 261.975786][T10111] IPVS: ftp: loaded support on port[0] = 21 20:56:18 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) socket(0x80000000000000a, 0x2, 0x0) 20:56:18 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r1, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r2, 0x4000) [ 262.093704][T10117] IPVS: ftp: loaded support on port[0] = 21 [ 262.155198][T10112] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(38837936981220) <= P.seqno(0) <= S.SWH(38837936981294)) and (P.ackno exists or LAWL(280054871123832) <= P.ackno(280054871123833) <= S.AWH(280054871123833), sending SYNC... 20:56:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x2c, 0x0, 0xb, 0x49de4d1c41542053, 0x0, 0x0, {}, [@NFCTH_TUPLE={0xc, 0x2, [@CTA_TUPLE_ZONE={0x8}]}, @NFCTH_NAME={0xc, 0x1, 'syz1\x00'}]}, 0x2c}}, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 262.262566][T10127] IPVS: ftp: loaded support on port[0] = 21 [ 262.293383][T10128] IPVS: ftp: loaded support on port[0] = 21 20:56:18 executing program 0: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x2f9) [ 262.346165][T10134] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 262.386168][T10110] dccp_close: ABORT with 1061 bytes unread [ 262.436478][T10134] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 20:56:19 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) 20:56:19 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) [ 262.528496][T10137] IPVS: ftp: loaded support on port[0] = 21 [ 262.595951][T10140] IPVS: ftp: loaded support on port[0] = 21 20:56:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 262.744883][T10148] IPVS: ftp: loaded support on port[0] = 21 [ 262.839813][T10155] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 20:56:19 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r2, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r3, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) 20:56:19 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)) [ 262.986225][T10159] IPVS: ftp: loaded support on port[0] = 21 20:56:19 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) 20:56:19 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r1, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r2, 0x4000) 20:56:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 263.176220][T10166] IPVS: ftp: loaded support on port[0] = 21 [ 263.286566][T10172] IPVS: ftp: loaded support on port[0] = 21 [ 263.315738][T10176] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 20:56:19 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) [ 263.352522][T10170] IPVS: ftp: loaded support on port[0] = 21 [ 263.530419][T10184] IPVS: ftp: loaded support on port[0] = 21 20:56:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) 20:56:20 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)) 20:56:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 263.726292][T10190] __nla_validate_parse: 4 callbacks suppressed [ 263.726301][T10190] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 263.765582][T10194] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 20:56:20 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) [ 263.914974][T10197] IPVS: ftp: loaded support on port[0] = 21 20:56:20 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r1, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r2, 0x4000) [ 263.957015][T10202] IPVS: ftp: loaded support on port[0] = 21 20:56:20 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r1, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r2, 0x4000) 20:56:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 264.075284][T10208] IPVS: ftp: loaded support on port[0] = 21 20:56:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) 20:56:20 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)) [ 264.182612][T10212] IPVS: ftp: loaded support on port[0] = 21 [ 264.210798][T10217] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 20:56:20 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r4 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) [ 264.267591][T10220] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 264.436843][T10226] IPVS: ftp: loaded support on port[0] = 21 [ 264.454550][T10224] IPVS: ftp: loaded support on port[0] = 21 20:56:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) 20:56:21 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) 20:56:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 264.682176][T10236] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 264.735927][T10241] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 264.798082][T10240] IPVS: ftp: loaded support on port[0] = 21 20:56:21 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)) 20:56:21 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) 20:56:21 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r1, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 20:56:21 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r1, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffffdffffff, 0x10, r2, 0x4000) 20:56:21 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) 20:56:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 265.078481][T10248] IPVS: ftp: loaded support on port[0] = 21 [ 265.117364][T10259] validate_nla: 6 callbacks suppressed [ 265.117372][T10259] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 265.144098][T10261] IPVS: ftp: loaded support on port[0] = 21 [ 265.168891][T10258] IPVS: ftp: loaded support on port[0] = 21 [ 265.178367][T10260] IPVS: ftp: loaded support on port[0] = 21 [ 265.183447][T10268] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 265.194082][T10259] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 265.201553][T10268] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 20:56:21 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) 20:56:21 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) socket$inet_tcp(0x2, 0x1, 0x0) [ 265.372461][T10272] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 265.391342][T10272] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 20:56:22 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) 20:56:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 265.514965][T10277] IPVS: ftp: loaded support on port[0] = 21 [ 265.552809][T10283] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 20:56:22 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 265.591087][T10283] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 265.650872][T10285] IPVS: ftp: loaded support on port[0] = 21 20:56:22 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 265.707782][T10290] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 20:56:22 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r1, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) 20:56:22 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @multicast1}}, 0x200, 0x8, 0x0, 0xffff1e43, 0x20, 0x4, 0x6}, &(0x7f0000000340)=0x9c) 20:56:22 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 265.958866][T10302] IPVS: ftp: loaded support on port[0] = 21 20:56:22 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) 20:56:22 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) 20:56:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) 20:56:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x907100) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 266.053523][T10308] IPVS: ftp: loaded support on port[0] = 21 [ 266.101911][T10316] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 20:56:22 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 266.144161][T10319] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 266.175172][T10315] IPVS: ftp: loaded support on port[0] = 21 20:56:22 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) 20:56:22 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) 20:56:22 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) r4 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) 20:56:22 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) [ 266.521045][T10338] IPVS: ftp: loaded support on port[0] = 21 [ 266.546746][T10335] IPVS: ftp: loaded support on port[0] = 21 20:56:23 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x3c1, 0x0, 0x0, [0x200001c0], 0x0, 0x0, 0x0}, 0x108) accept4$packet(r1, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14, 0x80000) 20:56:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000002020104000000000000000007616c6c666f7277617264696e6700000800094000"/56], 0x38}}, 0x40000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x93}, @NFACCT_PKTS={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000014}, 0x80) 20:56:23 executing program 0: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) 20:56:23 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/115, 0x73}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/29, 0x1d}, {&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/88, 0x58}], 0x9, &(0x7f0000000c40)=""/70, 0x46}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000e00)=ANY=[@ANYBLOB="46da1a2c9a4a71beba1409c37f9ce82b2b6678361a7188b27f1a8dea4f77ff88b5b0f001bb0df1e1b666acd700191f649b61f896ae75d96fb70bd4671882449593eadf0a1b8de04c24f767fc119406eed83ecb284223a446ff38c9f9086f6304811fa612944b17", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x2, 0x8, 0x203, 0x8, 0xffffffff, 0x4, 0x3, 0xb770, r3}, &(0x7f0000000dc0)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x50, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) 20:56:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, 0x0, 0x80) 20:56:23 executing program 2: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@rose, @default, @null, @netrom, @rose, @default, @null, @null]}, &(0x7f0000000080)=0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x22, 0x0, &(0x7f00000002c0)="5c710957ca9f13550b2ac06c0800a221865734734188a8914b41147948e3d14625a9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000005c0)={0x0, @adiantum}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x80000001) unshare(0x40000000) 20:56:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, 0x0, 0x80) [ 266.723307][T10348] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 20:56:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, 0x0, 0x80) [ 266.838863][T10358] IPVS: ftp: loaded support on port[0] = 21 [ 266.846833][T10359] IPVS: ftp: loaded support on p