0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:03 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:03 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:03 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:03 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2570.948440][T19697] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2570.962339][T19702] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2570.990808][T19704] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2571.007331][T19705] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:27:04 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de00", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2572.137890][T19717] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:27:05 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2573.391736][T19722] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:27:07 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:07 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:07 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2575.712090][T19725] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2575.721947][T19728] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:27:08 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2576.749774][T19734] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:27:14 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r4) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r5 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r6 = dup(r5) write$6lowpan_enable(r6, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:14 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:14 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:14 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:14 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:14 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2582.013597][T19743] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2582.014665][T19744] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2582.043835][T19746] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2582.062649][T19748] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:27:15 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2583.104989][T19758] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:27:16 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2584.085302][T19764] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:27:17 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2585.185591][T19768] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:27:19 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:19 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:19 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2587.459551][T19772] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2587.512018][T19774] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2590.517160][ T1214] ieee802154 phy0 wpan0: encryption failed: -22 [ 2590.523485][ T1214] ieee802154 phy1 wpan1: encryption failed: -22 17:27:24 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:24 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:24 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:24 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:24 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:24 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2592.725216][T19784] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2592.745037][T19788] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2592.751863][T19787] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2592.754664][T19785] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:27:30 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:30 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2598.326152][T19804] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:27:30 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:30 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], 0x0, 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2598.507805][T19806] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2598.577873][T19809] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:27:31 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:31 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2599.231553][T19816] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2599.382037][T19820] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:27:32 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2600.462617][T19825] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:27:33 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2601.231642][T19829] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:27:33 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2601.589944][T19831] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:27:34 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2602.949354][T19837] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:27:36 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2604.057005][T19841] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:27:37 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2604.995614][T19846] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:27:37 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], 0x0, 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:37 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:37 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:37 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], 0x0, 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2605.367000][T19850] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2605.526961][T19859] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2605.684952][T19862] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:27:38 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2606.133734][T19865] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:27:41 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], 0x0, 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:41 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2609.125345][T19869] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2609.225349][T19873] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:27:45 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:45 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:45 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:45 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], 0x0, 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:45 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:45 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2613.470522][T19885] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2613.486968][T19886] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2613.488378][T19883] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2613.507336][T19884] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2613.562445][T19888] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:27:49 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2617.201088][T19899] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:27:49 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], 0x0, 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2617.549747][T19903] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:27:50 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2618.164953][T19907] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:27:51 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:51 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, 0x0, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:51 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2619.803914][T19913] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2619.836466][T19914] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:27:58 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, 0x0, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:58 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], 0x0, 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:58 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:58 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:58 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:58 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2626.144834][T19924] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2626.150200][T19928] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2626.156878][T19927] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2626.167051][T19926] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2626.217679][T19930] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:27:59 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:27:59 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2627.210537][T19939] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2627.294261][T19942] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:00 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2628.117508][T19947] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:28:02 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2630.783497][T19950] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:28:03 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, 0x0, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2630.986579][T19954] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:28:07 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:07 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2635.525883][T19963] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2635.560732][T19964] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:07 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:08 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2636.047010][T19971] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2636.059171][T19970] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:28:08 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2636.738375][T19980] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:28:11 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:11 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:11 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:11 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:11 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:11 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2639.641827][T19987] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2639.658200][T19990] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2639.673271][T19992] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2639.687850][T19994] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2639.731703][T19993] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:28:12 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2640.874783][T20005] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:14 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2642.079512][T20009] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:15 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2643.232747][T20014] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:16 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2644.285703][T20018] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:17 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:17 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2645.718214][T20022] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:28:22 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:22 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:22 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:22 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r7) unshare(0x6c060000) 17:28:22 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:22 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2650.067351][T20030] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2650.091344][T20037] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2650.092488][T20036] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2650.122075][T20031] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2650.276319][T20041] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:28:22 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r7) unshare(0x6c060000) 17:28:23 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2651.019631][T20049] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:23 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2651.131113][T20051] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2651.179207][T20053] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:28:23 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r7) unshare(0x6c060000) [ 2651.368669][T20058] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2651.958106][ T1214] ieee802154 phy0 wpan0: encryption failed: -22 [ 2651.964684][ T1214] ieee802154 phy1 wpan1: encryption failed: -22 17:28:24 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:24 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2652.131157][T20063] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:28 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:28 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:28 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:28 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:28 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:28 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2656.771467][T20073] __nla_validate_parse: 1 callbacks suppressed [ 2656.771486][T20073] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2656.793888][T20076] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2656.806693][T20075] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2656.813462][T20078] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2656.861787][T20080] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:28:34 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2661.997705][T20090] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:34 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:34 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:34 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2662.243086][T20095] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2662.243796][T20093] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:28:34 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = dup(0xffffffffffffffff) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2662.556063][T20102] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:34 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2662.718296][T20104] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:28:39 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:39 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = dup(0xffffffffffffffff) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:39 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:39 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:39 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:39 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2667.678284][T20112] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2667.698708][T20117] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2667.703600][T20116] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2667.718812][T20118] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2667.747717][T20120] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:28:40 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = dup(0xffffffffffffffff) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2668.754717][T20129] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:41 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2669.016261][T20133] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:41 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2669.656173][T20137] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:42 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2670.604596][T20142] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:44 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2672.692197][T20147] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:28:44 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2672.867481][T20150] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:28:49 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:49 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:49 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:49 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:49 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:49 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2677.180819][T20162] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2677.184168][T20163] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2677.220756][T20165] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2677.231177][T20166] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:28:50 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:28:50 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2678.220175][T20180] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2678.263735][T20182] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:28:53 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2681.358286][T20189] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:55 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2682.963881][T20193] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:28:55 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2683.230733][T20196] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:28:55 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:00 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:00 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:00 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2688.110721][T20208] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2688.121358][T20211] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2688.121636][T20210] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2688.147719][T20213] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:29:03 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2691.069089][T20226] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:29:03 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2691.890937][T20230] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:29:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:06 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:06 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:06 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2694.119337][T20233] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2694.181971][T20237] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2694.242301][T20240] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:29:11 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:11 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:11 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:11 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:11 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:11 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2699.873271][T20252] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2699.874650][T20253] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2699.893004][T20251] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:29:12 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2700.899146][T20266] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:29:13 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2701.644076][T20270] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:29:16 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:16 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:16 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2704.890844][T20277] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2704.941319][T20279] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:29:17 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2705.148033][T20282] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:29:21 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:21 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x0, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:21 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:21 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:21 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:21 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2709.258033][T20292] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2709.279413][T20294] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2709.302817][T20297] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2709.314993][T20296] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:29:22 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2710.684375][T20309] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2713.396913][ T1214] ieee802154 phy0 wpan0: encryption failed: -22 [ 2713.403220][ T1214] ieee802154 phy1 wpan1: encryption failed: -22 17:29:26 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2714.409202][T20313] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:29:26 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:26 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:26 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:26 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x0, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2714.713709][T20316] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2714.761272][T20321] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2714.800183][T20320] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:29:31 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x0, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:31 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:31 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:31 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2719.488318][T20329] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2719.544830][T20335] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2719.558602][T20334] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:29:32 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2720.571465][T20346] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:29:33 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2721.515137][T20350] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:29:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x0, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:37 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:37 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:37 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], 0x0, 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:37 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:37 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x0, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2725.264015][T20358] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2725.290903][T20361] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2725.301444][T20359] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2725.302592][T20360] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:29:38 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:38 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], 0x0, 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2726.348474][T20376] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2726.361140][T20377] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:29:39 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2727.393538][T20382] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:29:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2728.686363][T20386] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:29:43 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:43 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2731.113194][T20390] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2731.120981][T20392] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:29:47 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], 0x0, 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:47 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x0, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:47 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:47 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], 0x0, 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:47 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:47 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2735.401137][T20400] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2735.417476][T20402] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2735.417784][T20404] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2735.427882][T20403] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2735.463910][T20406] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:29:52 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2740.060504][T20416] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:29:52 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:52 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2740.274870][T20420] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2740.314760][T20421] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:29:52 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:52 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x0, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2740.722883][T20426] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:29:53 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2741.246215][T20434] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:29:57 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:57 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:57 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:57 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:57 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:29:57 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x0, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2745.463030][T20444] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2745.475126][T20446] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2745.478039][T20443] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2745.488099][T20445] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2745.563236][T20450] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:30:03 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x0, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x0, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:03 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2751.163708][T20458] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:30:03 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2751.207855][T20463] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:30:03 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2751.347737][T20466] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2751.401286][T20470] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:30:07 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2755.996494][T20475] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:30:09 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:09 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:09 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x0, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:09 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:09 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:09 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(0xffffffffffffffff) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2757.299788][T20481] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2757.312102][T20479] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2757.325712][T20485] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2757.325853][T20484] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2757.358267][T20489] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:30:13 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2761.137056][T20498] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:30:14 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(0xffffffffffffffff) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:14 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2762.427480][T20504] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:30:14 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2762.727508][T20511] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:30:15 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(0xffffffffffffffff) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:15 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2763.390932][T20516] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:30:16 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2764.703352][T20522] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:30:17 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, 0x0, 0x0) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2765.399257][T20525] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:30:18 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, 0x0, 0x0) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2766.384680][T20530] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:30:19 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, 0x0, 0x0) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2767.625716][T20535] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:30:22 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:22 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:22 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:22 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:22 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, 0x0, 0x0) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:22 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2770.524624][T20544] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2770.542213][T20545] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2770.554975][T20548] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2770.565866][T20547] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2770.690953][T20553] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:30:23 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, 0x0, 0x0) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2771.773222][T20560] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:30:24 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, 0x0, 0x0) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2772.771998][T20564] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2774.837341][ T1214] ieee802154 phy0 wpan0: encryption failed: -22 [ 2774.843655][ T1214] ieee802154 phy1 wpan1: encryption failed: -22 17:30:27 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:27 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2775.826674][T20570] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:30:28 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2775.898897][T20572] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2775.970395][T20575] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:30:28 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:33 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:33 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:33 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:33 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:33 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:33 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2781.867904][T20591] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2781.878735][T20589] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2781.885937][T20593] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2781.893919][T20594] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2781.967480][T20597] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 17:30:38 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2786.398854][T20604] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:30:38 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2786.625050][T20608] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:30:39 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:39 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2787.277846][T20613] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2787.325164][T20615] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:30:39 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:39 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2787.642722][T20621] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:30:43 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:43 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:43 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:43 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:43 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:43 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2791.675913][T20631] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2791.697081][T20627] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2791.710947][T20634] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2791.721779][T20635] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:30:48 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2796.242868][T20646] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:30:48 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:48 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2796.906445][T20654] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:30:49 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2797.186793][T20658] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:30:50 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:50 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2798.117846][T20663] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2798.148704][T20665] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:30:51 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:51 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2799.186519][T20674] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2799.240162][T20672] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:30:52 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2800.460719][T20682] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:30:53 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2801.361391][T20688] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:30:56 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:56 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:56 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:56 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:56 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:30:56 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2804.340130][T20698] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2804.359006][T20701] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2804.360901][T20704] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2804.383199][T20702] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:31:01 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:01 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:01 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:01 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2809.477144][T20722] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2809.492642][T20723] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2809.509904][T20724] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2809.700259][T20730] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:31:02 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:07 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:07 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:07 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:07 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, 0x0, 0x0) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:07 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, 0x0, 0x0) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:07 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2815.095994][T20741] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2815.115059][T20744] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2815.132491][T20748] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2815.147307][T20749] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:31:11 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:11 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:11 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2819.405421][T20762] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2819.420196][T20765] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:31:13 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, 0x0, 0x0) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:13 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, 0x0, 0x0) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2821.222566][T20770] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2821.261545][T20772] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:31:17 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2825.677314][T20777] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:31:18 executing program 4: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) pipe2(&(0x7f00000011c0), 0x0) 17:31:18 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:18 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, 0x0, 0x0) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:18 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, 0x0, 0x0) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:18 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:18 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2826.832936][T20785] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2826.838716][T20786] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2826.868693][T20788] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:31:19 executing program 4: sigaltstack(&(0x7f0000ffe000), 0x0) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000180)=""/118) [ 2826.883012][T20787] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:31:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r0, &(0x7f0000000140)='7', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @mcast2}]}, &(0x7f0000000100)=0x10) 17:31:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r0, &(0x7f0000000140)='7', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @mcast2}]}, &(0x7f0000000100)=0x10) 17:31:20 executing program 4: io_setup(0x7, &(0x7f0000000000)=0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) io_submit(r0, 0x2, &(0x7f00000001c0)=[&(0x7f0000000080)={0x0, 0x0, 0x2, 0x0, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x0, r1, &(0x7f00000000c0)}]) 17:31:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='inode_readahead_blks=0x0000000000000000,nogrpid,debug_want_extra_isize=0x0000000000000066,dioread_nolock,max_batch_time=0x0000000000000008,resgid=', @ANYRESHEX=0x0, @ANYBLOB="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"], 0xfd, 0x435, &(0x7f00000008c0)="$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") setxattr$incfs_metadata(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080), &(0x7f0000001080)="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", 0x3ef, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="1c", 0x1) [ 2828.075138][T20807] loop4: detected capacity change from 0 to 512 [ 2828.107486][T20807] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 2828.171398][T20807] EXT4-fs (loop4): 1 truncate cleaned up [ 2828.186258][T20807] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 17:31:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='inode_readahead_blks=0x0000000000000000,nogrpid,debug_want_extra_isize=0x0000000000000066,dioread_nolock,max_batch_time=0x0000000000000008,resgid=', @ANYRESHEX=0x0, @ANYBLOB="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"], 0xfd, 0x435, &(0x7f00000008c0)="$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") setxattr$incfs_metadata(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080), &(0x7f0000001080)="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", 0x3ef, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="1c", 0x1) [ 2828.388967][ T5068] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2828.692816][T20811] loop4: detected capacity change from 0 to 512 [ 2828.788239][T20811] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 2828.938576][T20811] EXT4-fs (loop4): 1 truncate cleaned up [ 2828.959419][T20811] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 17:31:21 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d05000000000000000001020200090001"], 0x40}, 0x1, 0x40030000000000}, 0x0) [ 2829.279245][ T5068] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2829.648063][T20815] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 17:31:24 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:24 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(0xffffffffffffffff) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x2, &(0x7f00000002c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x0, r0, 0x0}]) 17:31:24 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:24 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:24 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(0xffffffffffffffff) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:24 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000080)) [ 2832.149751][T20822] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2832.162614][T20825] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2832.167928][T20826] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2832.184689][T20823] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:31:24 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000080)) 17:31:24 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000080)) 17:31:25 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000080)) 17:31:25 executing program 4: shmat(0x0, &(0x7f0000ffa000/0x2000)=nil, 0x6000) 17:31:25 executing program 4: epoll_create(0x7fffffff) [ 2836.276726][ T1214] ieee802154 phy0 wpan0: encryption failed: -22 [ 2836.283071][ T1214] ieee802154 phy1 wpan1: encryption failed: -22 17:31:29 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 17:31:29 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(0xffffffffffffffff) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2836.940548][T20852] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:31:29 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000005d40)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000040)="32cc3c7e", 0x4}], 0x1, &(0x7f0000000240)=[@hoplimit={{0x14}}], 0x18}}], 0x1, 0x0) 17:31:29 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:29 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(0xffffffffffffffff) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:29 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2837.265127][T20864] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2837.293988][T20861] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:31:29 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000600)=""/33) [ 2837.335155][T20866] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:31:29 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000600)=""/33) 17:31:30 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(0xffffffffffffffff) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:30 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000600)=""/33) [ 2838.004757][T20876] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:31:30 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000600)=""/33) 17:31:32 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:32 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(0xffffffffffffffff) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@private2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x2}, {{@in=@broadcast, 0x0, 0x33}, 0xa, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1}}, 0xe8) 17:31:32 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2840.842801][T20886] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2840.883606][T20889] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:31:33 executing program 4: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x46d, 0xc623, 0x40, 0x1, 0x2, 0x3, 0x9, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}, {{}, [{}]}}}]}}]}}, 0x0) 17:31:33 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2841.518963][T20898] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2841.715622][T18804] usb 5-1: new high-speed USB device number 13 using dummy_hcd [ 2842.036232][T18804] usb 5-1: too many configurations: 9, using maximum allowed: 8 [ 2842.145617][T18804] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2842.275737][T18804] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 17:31:34 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2842.375565][T18804] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2842.460184][T20902] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2842.470348][T18804] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2842.565700][T18804] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2842.665585][T18804] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2842.755996][T18804] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2842.855863][T18804] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2843.035531][T18804] usb 5-1: New USB device found, idVendor=046d, idProduct=c623, bcdDevice= 0.40 [ 2843.053060][T18804] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2843.061870][T18804] usb 5-1: Product: syz [ 2843.067532][T18804] usb 5-1: Manufacturer: syz [ 2843.077763][T18804] usb 5-1: SerialNumber: syz [ 2843.158094][T18804] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 2843.362082][T12816] usb 5-1: USB disconnect, device number 13 17:31:35 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r4) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r5 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r6 = dup(r5) write$6lowpan_enable(r6, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2843.631059][T20907] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:31:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x6c}, 0x0, @in=@loopback, 0x0, 0x4}}, 0xe8) 17:31:36 executing program 4: r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r0, 0xc1086201, 0x0) 17:31:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@private, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x8) 17:31:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0xb34980ef93c0c508, 0x0, 0x0) 17:31:38 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x80801) write$6lowpan_control(r0, &(0x7f0000000000)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 17:31:39 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:39 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r4) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r5 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r6 = dup(r5) write$6lowpan_enable(r6, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:39 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:39 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9}, 0x0) 17:31:39 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2846.908526][T20923] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2846.928022][T20927] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:31:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x1}, 0x33fe0}}, 0x0) [ 2846.965258][T20929] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:31:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14}, 0x14}, 0x300}, 0x0) [ 2847.174194][T20931] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:31:39 executing program 4: recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001980)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x80801) write$sysctl(r0, &(0x7f0000000100)='2\x00', 0xfffffffffffffd99) 17:31:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000080005"], 0x24}}, 0x0) 17:31:39 executing program 4: symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00') 17:31:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) writev(r0, &(0x7f0000000540)=[{0x0}, {0x0}, {&(0x7f0000000980)='Q', 0x1}], 0x3) 17:31:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x540c, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 17:31:43 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2851.724938][T20953] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:31:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x26) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0xc0182101, &(0x7f0000000140)={r5}) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:44 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, 0x0, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:44 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r4) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r5 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r6 = dup(r5) write$6lowpan_enable(r6, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:44 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:44 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:44 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2852.661815][T20963] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2852.685947][T20966] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2852.726943][T20967] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2852.786978][T20972] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:31:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getrlimit(0x8, &(0x7f00000007c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) getrlimit(0x0, &(0x7f0000000500)) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f0000000740)=[{{&(0x7f00000005c0)=@tipc, 0x80, &(0x7f0000000400)=[{&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000000640)=""/251, 0xfb}], 0x2}}], 0x40002db, 0x2, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000780)='net\x00') dup2(0xffffffffffffffff, r3) recvmmsg(r3, &(0x7f0000000c00)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000000240)=""/132, 0x84}, {&(0x7f0000000040)=""/31, 0x1f}, {&(0x7f0000000180)=""/69, 0x45}, {&(0x7f0000003a80)=""/4096, 0x1000}], 0x5, &(0x7f0000000100)=""/13, 0xd}, 0x5f62}, {{&(0x7f0000000540)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000800)=""/6, 0x6}}], 0x2, 0x12003, 0x0) syz_mount_image$exfat(&(0x7f0000001500), &(0x7f0000001540)='./file1\x00', 0x20010080, &(0x7f0000000300), 0x1, 0x14d7, &(0x7f0000001580)="$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") r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$CAN_RAW_FILTER(r4, 0x65, 0x1, &(0x7f00000004c0)=[{{0x2, 0x0, 0x0, 0x1}, {0x4, 0x1, 0x1}}, {{0x1, 0x1, 0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x4, 0x0, 0x0, 0x1}, {0x2}}, {{0x2, 0x1, 0x1, 0x1}, {0x3}}, {{0x4}}, {{0x3, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x1}}, {{0x3, 0x1, 0x1, 0x1}, {0x0, 0x1, 0x1}}, {{0x2}, {0x2}}], 0x40) open(&(0x7f0000000080)='./bus\x00', 0x6fe44da62996b272, 0x91) r5 = open(&(0x7f0000000500)='./bus\x00', 0x6fe44da629969272, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x80000041) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x1, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r6}, @generic={0x79}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2853.383288][T20980] loop4: detected capacity change from 0 to 256 [ 2856.484762][T20980] exFAT-fs (loop4): failed to load upcase table (idx : 0x00010000, chksum : 0x4f9d53fa, utbl_chksum : 0xe619d30d) 17:31:48 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c000000120001010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ae649979292c788e22d44065c"], 0x4c}}, 0x0) 17:31:49 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7f) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8937, &(0x7f0000000000)={'wg0\x00'}) 17:31:49 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x41, &(0x7f0000000040), 0x8) 17:31:49 executing program 4: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f00000010c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000001480)={0x0, 0x0, 0x5, &(0x7f0000001340)={0x5, 0xf, 0x5}}) [ 2857.471588][T18804] usb 5-1: new high-speed USB device number 14 using dummy_hcd [ 2857.755582][T18804] usb 5-1: Using ep0 maxpacket: 16 [ 2857.986270][T18804] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2858.032335][T18804] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2858.105510][T18804] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2858.183376][T18804] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 2858.260068][T18804] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 2858.340030][T18804] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 2858.615647][T18804] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2858.645761][T18804] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2858.706348][T18804] usb 5-1: Product: syz [ 2858.741582][T18804] usb 5-1: Manufacturer: syz [ 2858.773761][T18804] usb 5-1: SerialNumber: syz [ 2859.115605][T18804] cdc_ncm 5-1:1.0: bind() failure [ 2859.150047][T18804] cdc_ncm 5-1:1.1: CDC Union missing and no IAD found [ 2859.325919][T18804] cdc_ncm 5-1:1.1: bind() failure [ 2859.517124][T18804] usb 5-1: USB disconnect, device number 14 17:31:51 executing program 4: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f00000010c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000001480)={0x0, 0x0, 0x5, &(0x7f0000001340)={0x5, 0xf, 0x5}}) [ 2860.155489][T18804] usb 5-1: new high-speed USB device number 15 using dummy_hcd 17:31:52 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:52 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2860.445995][T18804] usb 5-1: Using ep0 maxpacket: 16 [ 2860.586185][T20996] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2860.598846][T20994] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2860.675576][T18804] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2860.725103][T18804] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2860.828531][T18804] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2860.877086][T18804] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 2860.927702][T18804] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 2860.968160][T18804] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 2861.166061][T18804] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2861.221849][T18804] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2861.279071][T18804] usb 5-1: Product: syz [ 2861.295567][T18804] usb 5-1: Manufacturer: syz 17:31:53 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, 0x0, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2861.337130][T18804] usb 5-1: SerialNumber: syz [ 2861.450782][T21001] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:31:53 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2861.695778][T18804] cdc_ncm 5-1:1.0: bind() failure [ 2861.712987][T18804] cdc_ncm 5-1:1.1: CDC Union missing and no IAD found [ 2861.746196][T18804] cdc_ncm 5-1:1.1: bind() failure [ 2861.766992][T18804] usb 5-1: USB disconnect, device number 15 [ 2861.803461][T21009] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:31:54 executing program 4: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f00000010c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000001480)={0x0, 0x0, 0x5, &(0x7f0000001340)={0x5, 0xf, 0x5}}) 17:31:54 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2862.380689][T21014] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2862.675638][ T7152] usb 5-1: new high-speed USB device number 16 using dummy_hcd [ 2862.945704][ T7152] usb 5-1: Using ep0 maxpacket: 16 [ 2863.145739][ T7152] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2863.208151][ T7152] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2863.279768][ T7152] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2863.339828][ T7152] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 2863.368875][ T7152] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 17:31:55 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2863.395854][ T7152] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 2863.566414][T21020] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2863.605599][ T7152] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2863.648828][ T7152] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2863.733792][ T7152] usb 5-1: Product: syz [ 2863.768788][ T7152] usb 5-1: Manufacturer: syz [ 2863.792462][ T7152] usb 5-1: SerialNumber: syz [ 2864.115846][ T7152] cdc_ncm 5-1:1.0: bind() failure [ 2864.151807][ T7152] cdc_ncm 5-1:1.1: CDC Union missing and no IAD found [ 2864.200400][ T7152] cdc_ncm 5-1:1.1: bind() failure [ 2864.260309][ T7152] usb 5-1: USB disconnect, device number 16 17:31:56 executing program 4: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f00000010c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000001480)={0x0, 0x0, 0x5, &(0x7f0000001340)={0x5, 0xf, 0x5}}) [ 2865.045648][ T7152] usb 5-1: new high-speed USB device number 17 using dummy_hcd [ 2865.305705][ T7152] usb 5-1: Using ep0 maxpacket: 16 [ 2865.525813][ T7152] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2865.573079][ T7152] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2865.651798][ T7152] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2865.730167][ T7152] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 2865.796890][ T7152] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 2865.875916][ T7152] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 17:31:58 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2866.125695][ T7152] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 17:31:58 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2866.205602][ T7152] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2866.263774][ T7152] usb 5-1: Product: syz [ 2866.290949][T21026] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2866.295417][ T7152] usb 5-1: Manufacturer: syz [ 2866.409063][ T7152] usb 5-1: SerialNumber: syz [ 2866.590647][T21030] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2866.745667][ T7152] cdc_ncm 5-1:1.0: bind() failure [ 2866.766225][ T7152] cdc_ncm 5-1:1.1: CDC Union missing and no IAD found [ 2866.870542][ T7152] cdc_ncm 5-1:1.1: bind() failure [ 2867.216237][ T7152] usb 5-1: USB disconnect, device number 17 17:31:59 executing program 4: process_vm_readv(0x0, &(0x7f00000014c0)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0, 0x0, 0x0) 17:31:59 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x5, &(0x7f0000000040)=0x1000, 0x4) 17:31:59 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:31:59 executing program 4: add_key$keyring(&(0x7f0000000080), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) [ 2867.742714][T21041] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 17:32:00 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, 0x0, 0x0) 17:32:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:00 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, 0x0, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2868.026060][T21048] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2868.049840][T21046] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:32:01 executing program 4: ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, 0x0) io_uring_setup(0x1ad4, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x3}) 17:32:01 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:01 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:01 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@can={{}, 0x0, 0x0, 0x0, 0x0, "3b43b97a825e601d"}, 0x10}}, 0x0) [ 2869.161145][T21060] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:32:01 executing program 4: socketpair(0x2c, 0x3, 0x2, &(0x7f0000000100)) 17:32:01 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, 0x0, 0x0) 17:32:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180), 0x802, 0x0) write$UHID_INPUT(r0, &(0x7f0000000ac0)={0x8, {"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", 0x1000}}, 0x1006) 17:32:02 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:02 executing program 4: bpf$PROG_LOAD(0x6, 0x0, 0xd43) 17:32:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440), 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:06 executing program 4: r0 = socket(0x22, 0x2, 0x4) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={0x0}}, 0x0) 17:32:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:06 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2874.050727][T21087] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2874.078985][T21089] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:32:06 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 17:32:08 executing program 4: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0285628, &(0x7f0000000380)=@multiplanar_overlay={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c4a8856c"}, 0x0, 0x3, {0x0}}) 17:32:08 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:08 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:08 executing program 4: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0xd, @vbi}) [ 2876.095918][T21104] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:32:08 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000004c0)={&(0x7f00000003c0)=ANY=[], 0x0, 0x2e}, 0x20) 17:32:08 executing program 4: pipe2(&(0x7f0000000700)={0xffffffffffffffff}, 0x0) fcntl$getflags(r0, 0x1) 17:32:08 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000440)={@random="a9fedc18bc5c", @broadcast, @val, {@ipv6}}, 0x0) 17:32:10 executing program 4: r0 = open(&(0x7f0000001300)='./file1\x00', 0x200, 0x0) fcntl$lock(r0, 0xb, 0x0) 17:32:10 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440), 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2879.025947][T21119] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:32:11 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440), 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:11 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000200)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 17:32:11 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:11 executing program 4: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) [ 2879.524461][T21125] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:32:13 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:13 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) dup2(r0, r1) 17:32:13 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:13 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) [ 2881.394758][T21137] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:32:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) 17:32:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x54, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 17:32:15 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440), 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2883.913672][T21151] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 17:32:17 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="9649bc81635d166c6c2fac86a3942988f59164889a972840304c23c71e0eab52a34e2b2b9c1fa885550d195d48742393cbc190be4c0bebbfd14749d96c8834526d14336527359ac4203b2d18609a0c54a7c0e7678cda75ca5a62027a621addf24142b5cd9d66e40ca81766990fc6a3", 0x6f}, {&(0x7f0000000200)="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", 0xfc}, {&(0x7f0000000c00)="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", 0xe97}], 0x3, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @private}}}], 0x20}, 0x1) 17:32:17 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440), 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:17 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@map, 0xffffffffffffffff, 0x16}, 0x10) 17:32:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x7, 0x5, 0x0, 0x1}, 0x48) [ 2885.554960][T21157] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:32:18 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:32:18 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2886.535309][T21167] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:32:18 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000400)={'syz_tun\x00'}) 17:32:18 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) 17:32:19 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2887.602662][T21184] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. 17:32:20 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r5) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:20 executing program 4: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x15, 0x0, 0x0, 0x0}, 0x20) 17:32:22 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da4505", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{0x0}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:22 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:22 executing program 4: bpf$BPF_PROG_DETACH(0x10, &(0x7f0000000400)={@cgroup, 0xffffffffffffffff, 0x7}, 0x10) 17:32:22 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4af35", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:22 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x1c, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@dev}, {@in6=@loopback}, @in=@local}}, 0xf0}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) dup(r6) writev(r4, &(0x7f0000000440), 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) [ 2890.009731][T21199] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2890.021288][T21198] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2890.031847][T21200] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2890.107079][T21204] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 17:32:23 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x0, 0x500, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xa8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x88081}, 0x4) r4 = openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007c1830e12e73c28269e142f8696316857dc0af18890a1cf9b8935cfaf8fe49a832025af7aaa9d59ad5107cc8f38f8da570d2979d86f6f9e05e46b940f2f15bf4dccc096508cc9da3f30b52130abdd0fa129c6c6488a65368de5a9726ebd6a8ef032def69c128b399aaab7714c90a34f8746713dbb516f94d5109e016123f9c4d6d4018921ca77d2b49fbef77063efb92fa87b6c7eac8c898a3fa9ebc7717cbb066802a0bc4bf86ea34a781b4eb0abeb8e89d9768a4edb72d4d91025d3631047d32aad146bcfb2ee6a7a0dfbf1484a5c82ecba56bb23eec81391bf49d58909e69f211feab6c2b7055311f086fa5fe99765d7c31da45050421a3865e3c175d10c302df85b66881401bfcfb39000000000000000000de0000a4", @ANYRESHEX, @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe8) dup(r6) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r8 = dup(r7) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) unshare(0x6c060000) 17:32:23 executing program 4: socketpair(0x2, 0x0, 0x2f6, &(0x7f00000000c0)) 17:32:23 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x40046207, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="04630440"], 0x0, 0x0, 0x0}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r3 = dup2(r1, r0) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r5 = dup2(r2, r4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r5, 0x4018620d, &(0x7f0000000000)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000001480)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r4, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000540)={0x44, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000340)}}], 0x0, 0x0, &(0x7f00000014c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f00000002c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 2891.337532][T21212] ------------[ cut here ]------------ [ 2891.343477][T21212] WARNING: CPU: 0 PID: 21212 at include/linux/mmap_lock.h:71 track_pfn_remap+0x3f4/0x4c0 [ 2891.353646][T21212] Modules linked in: [ 2891.357865][T21212] CPU: 0 PID: 21212 Comm: syz-executor.4 Not tainted 6.4.0-rc2-next-20230515-syzkaller #0 [ 2891.368061][T21212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 2891.378245][T21212] RIP: 0010:track_pfn_remap+0x3f4/0x4c0 [ 2891.383800][T21212] Code: a3 49 00 49 8d bc 24 68 01 00 00 31 f6 e8 b4 42 d6 08 31 ff 89 c3 89 c6 e8 a9 9f 49 00 85 db 0f 85 31 fe ff ff e8 7c a3 49 00 <0f> 0b e9 25 fe ff ff e8 70 a3 49 00 4c 89 e7 e8 38 5c 85 00 0f 0b [ 2891.403978][T21212] RSP: 0018:ffffc9001523f590 EFLAGS: 00010216 [ 2891.410308][T21212] RAX: 00000000000061bf RBX: 0000000000000000 RCX: ffffc9000b30b000 [ 2891.418399][T21212] RDX: 0000000000040000 RSI: ffffffff813a8034 RDI: 0000000000000005 [ 2891.426463][T21212] RBP: ffff888078b42d00 R08: 0000000000000005 R09: 0000000000000000 [ 2891.434468][T21212] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88807ba60000 [ 2891.442618][T21212] R13: 0000000000000000 R14: ffff888078b42d10 R15: 0000000000001000 [ 2891.450702][T21212] FS: 00007fa967049700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 2891.459854][T21212] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2891.466565][T21212] CR2: 0000001b2f224000 CR3: 000000002329d000 CR4: 00000000003506f0 [ 2891.474575][T21212] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2891.482617][T21212] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2891.490641][T21212] Call Trace: [ 2891.493931][T21212] [ 2891.496961][T21212] vm_insert_page+0x4a8/0x840 [ 2891.502182][T21212] ? down_read+0x13e/0x480 [ 2891.506853][T21212] ? __get_locked_pte+0x270/0x270 [ 2891.511955][T21212] binder_update_page_range+0x2f7/0x1680 [ 2891.517921][T21212] binder_alloc_new_buf+0xc40/0x1c00 [ 2891.523321][T21212] binder_transaction+0x2523/0x9920 [ 2891.528567][T21212] ? finish_task_switch.isra.0+0x389/0xc80 [ 2891.534388][T21212] ? __lock_acquire+0x1987/0x5f30 [ 2891.539463][T21212] ? binder_deferred_func+0x1150/0x1150 [ 2891.545015][T21212] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2891.551033][T21212] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2891.557138][T21212] ? find_held_lock+0x2d/0x110 [ 2891.561930][T21212] ? __might_fault+0xe2/0x190 [ 2891.566634][T21212] ? lock_downgrade+0x690/0x690 [ 2891.571489][T21212] ? trace_lock_acquire+0x12d/0x180 [ 2891.576753][T21212] ? __might_fault+0xb2/0x190 [ 2891.581428][T21212] ? lock_acquire+0x32/0xc0 [ 2891.585962][T21212] ? __might_fault+0xb2/0x190 [ 2891.590647][T21212] binder_ioctl+0x312e/0x93a0 [ 2891.595341][T21212] ? tomoyo_path_number_perm+0x166/0x570 [ 2891.601087][T21212] ? binder_transaction+0x9920/0x9920 [ 2891.606734][T21212] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2891.612570][T21212] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2891.618743][T21212] ? do_vfs_ioctl+0x132/0x1670 [ 2891.623520][T21212] ? vfs_fileattr_set+0xc40/0xc40 [ 2891.628629][T21212] ? do_one_initcall+0xe0/0x540 [ 2891.633561][T21212] ? receive_fd+0x110/0x110 [ 2891.638179][T21212] ? __fget_files+0x26a/0x480 [ 2891.642862][T21212] ? bpf_lsm_file_ioctl+0x9/0x10 [ 2891.648018][T21212] ? binder_transaction+0x9920/0x9920 [ 2891.653445][T21212] __x64_sys_ioctl+0x197/0x210 [ 2891.658359][T21212] do_syscall_64+0x39/0xb0 [ 2891.662827][T21212] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2891.668829][T21212] RIP: 0033:0x7fa96628c169 [ 2891.673282][T21212] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2891.693017][T21212] RSP: 002b:00007fa967049168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2891.701505][T21212] RAX: ffffffffffffffda RBX: 00007fa9663abf80 RCX: 00007fa96628c169 [ 2891.709998][T21212] RDX: 0000000020000540 RSI: 00000000c0306201 RDI: 0000000000000003 [ 2891.718276][T21212] RBP: 00007fa9662e7ca1 R08: 0000000000000000 R09: 0000000000000000 [ 2891.726401][T21212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2891.734487][T21212] R13: 00007ffefb9c84bf R14: 00007fa967049300 R15: 0000000000022000 [ 2891.742574][T21212] [ 2891.745688][T21212] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2891.752962][T21212] CPU: 0 PID: 21212 Comm: syz-executor.4 Not tainted 6.4.0-rc2-next-20230515-syzkaller #0 [ 2891.762851][T21212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 2891.772913][T21212] Call Trace: [ 2891.776187][T21212] [ 2891.779120][T21212] dump_stack_lvl+0xd9/0x150 [ 2891.783737][T21212] panic+0x686/0x730 [ 2891.787641][T21212] ? panic_smp_self_stop+0xa0/0xa0 [ 2891.792753][T21212] ? show_trace_log_lvl+0x285/0x390 [ 2891.798014][T21212] ? track_pfn_remap+0x3f4/0x4c0 [ 2891.803424][T21212] check_panic_on_warn+0xb1/0xc0 [ 2891.808394][T21212] __warn+0xf2/0x390 [ 2891.812343][T21212] ? track_pfn_remap+0x3f4/0x4c0 [ 2891.817287][T21212] report_bug+0x2da/0x500 [ 2891.821640][T21212] handle_bug+0x3c/0x70 [ 2891.825806][T21212] exc_invalid_op+0x18/0x50 [ 2891.830303][T21212] asm_exc_invalid_op+0x1a/0x20 [ 2891.835170][T21212] RIP: 0010:track_pfn_remap+0x3f4/0x4c0 [ 2891.840740][T21212] Code: a3 49 00 49 8d bc 24 68 01 00 00 31 f6 e8 b4 42 d6 08 31 ff 89 c3 89 c6 e8 a9 9f 49 00 85 db 0f 85 31 fe ff ff e8 7c a3 49 00 <0f> 0b e9 25 fe ff ff e8 70 a3 49 00 4c 89 e7 e8 38 5c 85 00 0f 0b [ 2891.860368][T21212] RSP: 0018:ffffc9001523f590 EFLAGS: 00010216 [ 2891.866434][T21212] RAX: 00000000000061bf RBX: 0000000000000000 RCX: ffffc9000b30b000 [ 2891.874399][T21212] RDX: 0000000000040000 RSI: ffffffff813a8034 RDI: 0000000000000005 [ 2891.882385][T21212] RBP: ffff888078b42d00 R08: 0000000000000005 R09: 0000000000000000 [ 2891.890363][T21212] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88807ba60000 [ 2891.898322][T21212] R13: 0000000000000000 R14: ffff888078b42d10 R15: 0000000000001000 [ 2891.906294][T21212] ? track_pfn_remap+0x3f4/0x4c0 [ 2891.911253][T21212] vm_insert_page+0x4a8/0x840 [ 2891.915953][T21212] ? down_read+0x13e/0x480 [ 2891.920377][T21212] ? __get_locked_pte+0x270/0x270 [ 2891.925411][T21212] binder_update_page_range+0x2f7/0x1680 [ 2891.931067][T21212] binder_alloc_new_buf+0xc40/0x1c00 [ 2891.936380][T21212] binder_transaction+0x2523/0x9920 [ 2891.941684][T21212] ? finish_task_switch.isra.0+0x389/0xc80 [ 2891.947500][T21212] ? __lock_acquire+0x1987/0x5f30 [ 2891.952521][T21212] ? binder_deferred_func+0x1150/0x1150 [ 2891.958085][T21212] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2891.964073][T21212] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2891.970085][T21212] ? find_held_lock+0x2d/0x110 [ 2891.974855][T21212] ? __might_fault+0xe2/0x190 [ 2891.979528][T21212] ? lock_downgrade+0x690/0x690 [ 2891.984485][T21212] ? trace_lock_acquire+0x12d/0x180 [ 2891.989698][T21212] ? __might_fault+0xb2/0x190 [ 2891.994386][T21212] ? lock_acquire+0x32/0xc0 [ 2891.998896][T21212] ? __might_fault+0xb2/0x190 [ 2892.003583][T21212] binder_ioctl+0x312e/0x93a0 [ 2892.008273][T21212] ? tomoyo_path_number_perm+0x166/0x570 [ 2892.013938][T21212] ? binder_transaction+0x9920/0x9920 [ 2892.019338][T21212] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2892.025146][T21212] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2892.031065][T21212] ? do_vfs_ioctl+0x132/0x1670 [ 2892.035841][T21212] ? vfs_fileattr_set+0xc40/0xc40 [ 2892.040891][T21212] ? do_one_initcall+0xe0/0x540 [ 2892.045757][T21212] ? receive_fd+0x110/0x110 [ 2892.050344][T21212] ? __fget_files+0x26a/0x480 [ 2892.055015][T21212] ? bpf_lsm_file_ioctl+0x9/0x10 [ 2892.059960][T21212] ? binder_transaction+0x9920/0x9920 [ 2892.065337][T21212] __x64_sys_ioctl+0x197/0x210 [ 2892.070108][T21212] do_syscall_64+0x39/0xb0 [ 2892.074546][T21212] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2892.080439][T21212] RIP: 0033:0x7fa96628c169 [ 2892.084932][T21212] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2892.104529][T21212] RSP: 002b:00007fa967049168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2892.112931][T21212] RAX: ffffffffffffffda RBX: 00007fa9663abf80 RCX: 00007fa96628c169 [ 2892.120907][T21212] RDX: 0000000020000540 RSI: 00000000c0306201 RDI: 0000000000000003 [ 2892.129321][T21212] RBP: 00007fa9662e7ca1 R08: 0000000000000000 R09: 0000000000000000 [ 2892.137303][T21212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2892.145361][T21212] R13: 00007ffefb9c84bf R14: 00007fa967049300 R15: 0000000000022000 [ 2892.153365][T21212] [ 2892.156641][T21212] Kernel Offset: disabled [ 2892.161507][T21212] Rebooting in 86400 seconds..